Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 41;   October 11, 2023: Self-Importance and Conversational Narcissism at Work: II

Self-Importance and Conversational Narcissism at Work: II

by

Self-importance is one of four major themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are eight examples that emphasize self-importance.
Men in conversation at an event

Men in conversation at an event. Can you tell who's speaking and who's listening? Image by Henri Mathieu-Saint-Laurent, courtesy Pexels.com.

This exploration of conversational narcissism began last time with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or along directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions — biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.

The methods used can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post continues an exploration of the narcissistic behaviors that are most closely associated with the abuser's sense of self-importance.

As explained last time, I use the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. And I described five ploys abusers use and which are associated with a sense of self-importance of the abuser.

In what follows, I describe someone as "having the talking stick" if he or she is the person who is acknowledged as the current speaker by the conversation participants.

More patterns of conversational narcissism that are associated with a sense of self-importance

To enhance their sense of self-importance, abusers can try compelling requests for enlightenment, playing advisor, playing teacher, infringing "internal copyright", disparaging others and their work, controlling the conversation focus, boasting, and complaining.

Descriptions of these patterns follow.

Compelling requests for enlightenment
Here are some techniques abusers can use for compelling auditors to ask for enlightenment:
  • Use vocabulary, especially terms of art, that might be unfamiliar to auditors
  • Use words rarely heard in conversation (examples: sedulous, propinquity, blandishment)
  • Use acronyms or initialisms unfamiliar to auditors
  • Use foreign words or phrases when a native construct would suffice (examples for English: ab initio, a posteriori, ipso facto, nom de plume, prima facie, schadenfreude)
Using arcane terms, or terms used only by those of elevated stature, communicates to auditors that the abuser is also of elevated stature, and — what's more important — the auditors are not.
Playing advisor
By providing By providing advice not requested, conversation
participants place themselves in a one-up
position, well above their auditors
advice not requested, abusers place themselves in the one-up position, and their auditors in the one-down position. This consolidates the abusers' views of their own self-importance. Condescension is a common adjunct to this stance.
Playing teacher
A special case of playing advisor is playing teacher. In this pattern, the abuser corrects the usage, pronunciation, or grammar of the target. In an advanced form of the tactic, the abuser announces (possibly before witnesses) that he or she will be offering these corrections, "…because I know you won't mind learning something new today."
Infringing "internal copyright"
There is no "internal copyright" for contributions to workplace projects, but we do generally know the identities of contributors to important pieces of work. Abusers tend to believe that few co-workers produce any important work free of contributions by the abuser. Abusers are relentless advocates of this view, which they propagate by claiming sole credit for achievements of others.
Disparaging others and their work
Abusers do prepare for situations in which they cannot claim credit for all important work. When that happens, they disparage both the work in question and its author(s). Following their familiar pattern, they use any tools available to accomplish the disparagement, including raising objections, sowing doubts, questioning the motives of others, and misrepresenting the views of others (often unnamed). They usually offer these assertions without evidence, which they regard as unnecessary.
Controlling the conversation focus
When someone makes a contribution to the conversation, abusers employing this tactic jump in and make another contribution unrelated to what preceded it. This is a maneuver I call plopping. [Brenner 2003.1] Ideally, from the perspective of the abuser, the abuser's contribution brings the focus of conversation back to the abuser. The intent is to shift the conversation focus from the previous contribution onto the abuser's contribution. But when someone else treats the abuser's contribution that same way, i.e., when someone plops it, the abuser shifts the focus back to the abuser's contribution, a maneuver I call unplopping. Abusers sometimes repeatedly unplop the same contribution, if necessary, until all other participants surrender.
Boasting
To boast is to make exaggerated (and possibly unjustifiable or untrue) assertions about the superiority of one's accomplishments. Abusers use this tactic in conversation, of course. But they do so with multiple purposes. They want to shift focus to themselves, or disparage others or others' work, or consume conversation time, or any of the other tactics listed here.
Complaining
Registering complaints about situations unrelated to the conversation topic is one way to shift focus from the current topic. But complaining can also serve the other purposes described above. It directs attention to the abuser, it consumes conversation time, it can disparage the work of others, it can compel requests for explanations, and so on.

Last words

In the next post, I explore tactics abusers use that are associated with exploiting the other participants in the conversation. First in this series  Next in this series Go to top Top  Next issue: Exploitation and Conversational Narcissism at Work: I  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Brenner 2003.1]
Richard Brenner. "Plopping," Point Lookout blog, October 22, 2003. Available here. Back

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

A forest glenGames for Meetings: I
We spend a lot of time and emotional energy in meetings, much of it engaged in any of dozens of ritualized games. Here's Part I of a little catalog of some of our favorites, and what we can do about them.
An Empire AppleVirtual Meetings: Dealing with Inattention
There is much we can do to reduce the incidence of inattention in virtual meetings. Cooperation is required.
A VoiceStation 500 speakerphone by PolycomInterrupting Others in Meetings Safely: II
When we feel the need to interrupt someone who's speaking in a meeting, to offer a view or information, we would do well to consider (and mitigate) the risk of giving offense. Here are some techniques for interrupting the speaker in situations not addressed by the meeting's formal process.
Bull moose sparring in Grand Teton National ParkDisagreements in Virtual Meetings
Disagreements about substance can sometimes become unpleasant. And it seems that the likelihood of this happening is greater in virtual meetings. Six tactics can help keep things calm enough for groups to work better together.
A schematic of a symmetric virtual meetingThe Six Dimensions of Online Disinhibition: I
The online environment has properties that cause us to relax the inhibitions that keep us civil. And that leads to an elevated incidence of toxic conflict in public cyberspace. But workplace cyberspace is different. There is reason for optimism there.

See also Effective Meetings and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

Three gears in a configuration that's inherently locked upComing April 24: Antipatterns for Time-Constrained Communication: 1
Knowing how to recognize just a few patterns that can lead to miscommunication can be helpful in reducing the incidence of problems. Here is Part 1 of a collection of communication antipatterns that arise in technical communication under time pressure. Available here and by RSS on April 24.
A dangerous curve in an icy roadAnd on May 1: Antipatterns for Time-Constrained Communication: 2
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of problems. Here is Part 2 of a collection of antipatterns that arise in technical communication under time pressure, emphasizing those that depend on content. Available here and by RSS on May 1.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.