Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 41;   October 11, 2023: Self-Importance and Conversational Narcissism at Work: II

Self-Importance and Conversational Narcissism at Work: II

by

Self-importance is one of four major themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are eight examples that emphasize self-importance.
Men in conversation at an event

Men in conversation at an event. Can you tell who's speaking and who's listening? Image by Henri Mathieu-Saint-Laurent, courtesy Pexels.com.

This exploration of conversational narcissism began last time with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or along directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions — biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.

The methods used can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post continues an exploration of the narcissistic behaviors that are most closely associated with the abuser's sense of self-importance.

As explained last time, I use the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. And I described five ploys abusers use and which are associated with a sense of self-importance of the abuser.

In what follows, I describe someone as "having the talking stick" if he or she is the person who is acknowledged as the current speaker by the conversation participants.

More patterns of conversational narcissism that are associated with a sense of self-importance

To enhance their sense of self-importance, abusers can try compelling requests for enlightenment, playing advisor, playing teacher, infringing "internal copyright", disparaging others and their work, controlling the conversation focus, boasting, and complaining.

Descriptions of these patterns follow.

Compelling requests for enlightenment
Here are some techniques abusers can use for compelling auditors to ask for enlightenment:
  • Use vocabulary, especially terms of art, that might be unfamiliar to auditors
  • Use words rarely heard in conversation (examples: sedulous, propinquity, blandishment)
  • Use acronyms or initialisms unfamiliar to auditors
  • Use foreign words or phrases when a native construct would suffice (examples for English: ab initio, a posteriori, ipso facto, nom de plume, prima facie, schadenfreude)
Using arcane terms, or terms used only by those of elevated stature, communicates to auditors that the abuser is also of elevated stature, and — what's more important — the auditors are not.
Playing advisor
By providing By providing advice not requested, conversation
participants place themselves in a one-up
position, well above their auditors
advice not requested, abusers place themselves in the one-up position, and their auditors in the one-down position. This consolidates the abusers' views of their own self-importance. Condescension is a common adjunct to this stance.
Playing teacher
A special case of playing advisor is playing teacher. In this pattern, the abuser corrects the usage, pronunciation, or grammar of the target. In an advanced form of the tactic, the abuser announces (possibly before witnesses) that he or she will be offering these corrections, "…because I know you won't mind learning something new today."
Infringing "internal copyright"
There is no "internal copyright" for contributions to workplace projects, but we do generally know the identities of contributors to important pieces of work. Abusers tend to believe that few co-workers produce any important work free of contributions by the abuser. Abusers are relentless advocates of this view, which they propagate by claiming sole credit for achievements of others.
Disparaging others and their work
Abusers do prepare for situations in which they cannot claim credit for all important work. When that happens, they disparage both the work in question and its author(s). Following their familiar pattern, they use any tools available to accomplish the disparagement, including raising objections, sowing doubts, questioning the motives of others, and misrepresenting the views of others (often unnamed). They usually offer these assertions without evidence, which they regard as unnecessary.
Controlling the conversation focus
When someone makes a contribution to the conversation, abusers employing this tactic jump in and make another contribution unrelated to what preceded it. This is a maneuver I call plopping. [Brenner 2003.1] Ideally, from the perspective of the abuser, the abuser's contribution brings the focus of conversation back to the abuser. The intent is to shift the conversation focus from the previous contribution onto the abuser's contribution. But when someone else treats the abuser's contribution that same way, i.e., when someone plops it, the abuser shifts the focus back to the abuser's contribution, a maneuver I call unplopping. Abusers sometimes repeatedly unplop the same contribution, if necessary, until all other participants surrender.
Boasting
To boast is to make exaggerated (and possibly unjustifiable or untrue) assertions about the superiority of one's accomplishments. Abusers use this tactic in conversation, of course. But they do so with multiple purposes. They want to shift focus to themselves, or disparage others or others' work, or consume conversation time, or any of the other tactics listed here.
Complaining
Registering complaints about situations unrelated to the conversation topic is one way to shift focus from the current topic. But complaining can also serve the other purposes described above. It directs attention to the abuser, it consumes conversation time, it can disparage the work of others, it can compel requests for explanations, and so on.

Last words

In the next post, I explore tactics abusers use that are associated with exploiting the other participants in the conversation.  Self-Importance and Conversational Narcissism at Work: I First issue in this series   Exploitation and Conversational Narcissism at Work: I Next issue in this series  Go to top Top  Next issue: Exploitation and Conversational Narcissism at Work: I  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Brenner 2003.1]
Richard Brenner. "Plopping," Point Lookout blog, October 22, 2003. Available here. Back

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

The Thinker PowerPointingThink Before You PowerPoint
Microsoft PowerPoint is a useful tool. Many of us use it daily to create presentations that guide meetings or focus discussions. Like all tools, it can be abused — it can be a substitute for constructive dialog, and even for thought. What can we do about PowerPoint abuse?
Silly putty dripping through a holeOn Facilitation Suggestions from Meeting Participants
Team leaders often facilitate their own meetings, and although there are problems associated with that dual role, it's so familiar that it works well enough, most of the time. Less widely understood are the problems that arise when other meeting participants make facilitation suggestions.
Word salad with font dressingVirtual Meetings: Indicators of Inattention
If you've ever led a virtual meeting, you're probably familiar with the feeling that some attendees are doing something else. Here are some indicators of inattention.
Time is moneyCosts of the Catch-Me-Up Anti-Pattern: I
Your meetings start on time, but some people are habitually late. When they arrive, they ask, "What did I miss? Catch me up." This is an expensive way to do business. How expensive is it?
A serene mountain lakeNine Brainstorming Demotivators: I
The quality of the output of brainstorming sessions is notoriously variable. One source of variation is the enthusiasm of contributors. Here's Part I of a set of nine phenomena that can limit contributions to brainstorm sessions.

See also Effective Meetings and Effective Meetings for more related articles.

Forthcoming issues of Point Lookout

A white water rafting team completes its courseComing December 11: White Water Rafting as a Metaphor for Group Development
Tuckman's model of small group development, best known as "Forming-Storming-Norming-Performing," applies better to development of some groups than to others. We can use a metaphor to explore how the model applies to Storming in task-oriented work groups. Available here and by RSS on December 11.
Tuckman's stages of group developmentAnd on December 18: Subgrouping and Conway's Law
When task-oriented work groups address complex tasks, they might form subgroups to address subtasks. The structure of the subgroups and the order in which they form depend on the structure of the group's task and the sequencing of the subtasks. Available here and by RSS on December 18.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.