Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 43;   October 25, 2023: Exploitation and Conversational Narcissism at Work: II

Exploitation and Conversational Narcissism at Work: II


Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are six examples that emphasize exploitation of others.
The Arc de Triomphe in Paris

The Arc de Triomphe in Paris. It honors those who fought and died for France in the French Revolutionary War and the Napoleonic War. Imagine the feelings you might have as a participant in a military parade under or near the Arc de Triomphe. That feeling might be similar to what an abuser might seek to feel by employing the techniques described here. Image by Lilen23 courtesy Pixabay.

This exploration of conversational narcissism began with "Self-Importance and Conversational Narcissism at Work: I," Point Lookout for October 4, 2023, with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or along directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions — biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.

The methods used can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post continues an exploration of the narcissistic behaviors that are most closely associated with exploiting other participants in the conversation.

A bit of terminology

In that When abusers use "I" statements that
ought properly to be "We" statements,
they seem to the uninitiated to be
leaders or experts when they are not
first post of this series I introduced the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. In general, it's the behavior that is narcissistic, not the person exhibiting the behavior (though some who exhibit the behavior are narcissists).

In what follows, as in the previous posts in this series, I describe someone as "having the talking stick" if he or she is the person whom the conversation participants acknowledge as the current speaker. (The term speaker won't do, because someone else might be speaking too.)

Guided by the work of Vangelisti, et al., I've collected ten different patterns abusers use and which are associated with exploiting other conversation participants. [Vangelisti 1990] I described four patterns last time.

Seven more patterns of conversational narcissism that are associated with exploitation of others

In this post I describe six more patterns abusers use to exploit the other conversation participants. They include contributing aggressively, interrupting, overtalking, talking rapidly, talking continuously, acting as emcee, and using iceberg statements.

Descriptions follow.

Contributing aggressively
When speaking, abusers can employ extended direct eye contact (glaring) to assert dominance over other conversation participants. [Toscano 2018] This behavior can be especially useful to the abuser who regards a particular participant as likely to seize the talking stick or to redirect the conversation.
In face-to-face conversations, glaring at one participant while speaking can be a tool of intimidation. In video conferencing, the analogous tactic is looking into the camera and either prefacing a contribution with one participant's name, or naming that participant repeatedly during the contribution, or both.
Wiemann and Knapp define an interruption as an "…attempt to assume the speaking role before it has been relinquished by the current speaker." [Wiemann 2017] Interrupting is a technique that accomplishes several possible goals of abusers. After acquiring the talking stick, they can filibuster, which helps them consume time, or they can engage in narcissistic questioning, or any number of other maneuvers. But the interruption itself is exploitative, in that it is a statement that the person interrupted is of lesser value than the abuser.
An advanced form of interrupting is interrupting with deniability. To interrupt deniably, the abuser makes a contribution while another participant has merely paused for breath or punctuation. The abuser then presses on, even after the interrupted participant tries to resume after pausing. The interruption is deniable because it appears superficially to be an honest mistake — most participants and witnesses assume that the abuser simply failed to notice that he or she interrupted someone.
Overtalking is the tactic of intentionally beginning to speak, or continuing to speak, to prevent others from speaking or to make them stop if they're already speaking. [Brenner 2013.2] Overtalking also happens when the target of an interruption decides to keep speaking. The interrupter then makes the same choice. Overtalking is another method of dismissing the target's speech as worthless.
Overtalking is equivalent to prefacing a contribution with, "Whatever you're saying is of less value than what I have to say." Many experience overtalking as abuse or bullying.
Abusers find this tactic extraordinarily useful not only for dominating conversations, but also for guiding conversations they don't yet utterly dominate.
Talking rapidly
Involuntary rapid speech is associated with various mental disorders. Talking rapidly, voluntarily, is something else again. It's a tactic abusers employ to create difficulty for auditors in two ways. First, talking rapidly tightens the abuser's hold on the talking stick by creating difficulty for other participants to begin speaking without interrupting the abuser. Second, a high tempo makes grasping the abuser's meaning more difficult, especially if the auditors are less than conversant in the topic. If the topic is arcane or specialized, or if it involves complex arguments, talking rapidly can compel auditors to ask for clarification or elaboration. It's exploitative because it compels auditors to admit that they aren't following. It's another tool of humiliation.
Escalating volume is an option abusers can use to enhance the effect of talking rapidly. It's equivalent to verbal violence. By escalating voice volume when overtalking or talking rapidly, the abuser intends to prevent the target from speaking or even thinking.
Talking continuously
When speaking, many non-abusers pause for breath, or for the conversational equivalent of punctuation, such as commas, periods, or em dashes. To talk continuously, the abuser must master the art of avoiding these pauses and breaks, because they normally serve as cues to others to reach for the talking stick. Instead, abusers pause in mid-thought, which confounds those waiting to speak. Example: "I've never found the M1 highway to <pause> be busy at that hour."
Acting as emcee
Some abusers adopt the role of emcee, offering the talking stick to another participant (or a series of other participants). Example: "Mark, tell us about your trip to D.C." This behavior might be appropriate, even welcome, in some situations, and when executed with grace and generosity. One such situation is hosting a dinner party in which many of the guests aren't well known to each other.
But in an ironic twist, in other circumstances this same behavior can be exploitative. Abusers sometimes recognize in a moment of clarity that they have been abusing the conversation and its participants. One option would be to begin supporting the conversation and its participants in whichever direction they choose. But often the abuser chooses to direct the attention of the participants to one of their number, as an emcee. Their calculation seems to be that directing the group's attention to someone other than themselves serves to acquit the abuser of the charge of abuse. The stratagem fails, because the abuser is now the emcee, which is a form of indirectly directing.
Using iceberg statements
The iceberg is a widely used metaphor for systems that have the property that only a small part of the whole is evident. In the self-help community, an "iceberg statement" is one that indicates that the speaker has a story to tell more significant than the statement itself. By listening for iceberg statements, so the theory goes, the auditor can be more adept at building relationships. [Yee 2013].
Abusers can work this angle in reverse to exploit auditors. By devising iceberg statements, abusers can induce auditors to ask the questions that the abusers can use to steer or dominate the conversation. From the abuser's perspective, the techniques encouraged by the self-help community are free assistance.

Last words

When a skilled abuser deftly exploits other conversation participants, some (or all) of those participants might be unaware of what has occurred. The abuser is satisfied, and the other participants are unaware that they have served the abuser's purpose. But abusers must take care. Some who do recognize the pattern choose not to challenge their abusers. They might have answered in the negative two questions: First, "Is confrontation worth the effort and risk?" And second, "Is the likelihood of a mutually beneficial outcome to the confrontation great enough?" First in this series  Next in this series Go to top Top  Next issue: Exhibitionism and Conversational Narcissism at Work: I  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info


Comprehensive list of all citations from all editions of Point Lookout
[Vangelisti 1990]
Anita L. Vangelisti, Mark L. Knapp, and John A. Daly. "Conversational narcissism." Communications Monographs 57:4 (1990), pp. 251-274. Available here. Retrieved 16 September 2023. Back
[Toscano 2018]
Hugo Toscano, Thomas W. Schubert, and Steffen R. Giessner. "Eye gaze and head posture jointly influence judgments of dominance, physical strength, and anger," Journal of Nonverbal Behavior 42 (2018), pp. 285-309. Available here. Retrieved 7 October 2023. Back
[Wiemann 2017]
John M. Wiemann and Mark L. Knapp. "Turn-taking in conversations," Communication Theory, 4 (2017), pp. 226-45. Available here. Retrieved 7 October 2023. Back
[Brenner 2013.2]
Richard Brenner. "Overtalking: I," Point Lookout blog, October 16, 2013. Available here. Back
[Yee 2013]
Challen Yee. "How to Build Rapport with a Stranger","Seeking the Narrow Way" blog,December 18, 2013,Available here. Retrieved 6 October 2023. Back

Your comments are welcome

Would you like to see your comments posted here? rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

Carrot and stickIrrational Self-Interest
When we try to influence others, especially large groups or entire companies, we sometimes create packages of incentives and disincentives that are intended to affect behavior. These strategies usually assume that people make choices on rational grounds. Is this assumption valid?
Water bottlesAn Agenda for Agendas
Most of us believe that the foundation of a well-run meeting is a well-formed agenda. What makes a "well-formed" agenda? How can we write and manage agendas to make meetings successful?
Word salad with font dressingVirtual Meetings: Indicators of Inattention
If you've ever led a virtual meeting, you're probably familiar with the feeling that some attendees are doing something else. Here are some indicators of inattention.
Egyptian forces cross a bridge over the Suez Canal on October 7, 1973, during the Arab-Israeli WarGuidelines for Curmudgeon Teams
The curmudgeon team is a subgroup of a larger team. Their job is to strengthen the team's conclusions and results by raising thorny issues that cause the team to reconsider the path it's about to take. In this way they help the team avoid dead ends and disasters.
A meeting that's probably a bit too largeA Pain Scale for Meetings
Most meetings could be shorter, less frequent, and more productive than they are. Part of the problem is that we don't realize how much we do to get in our own way. If we track the incidents of dysfunctional activity, we can use the data to spot trends and take corrective action.

See also Effective Meetings and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

What a videoconference looks like when all participants have their cameras offComing December 6: Off-Putting and Conversational Narcissism at Work: III
Having off-putting interactions is one of four themes of conversational narcissism. Here are seven behavioral patterns that relate to off-putting interactions and how abusers use them to control conversations. Available here and by RSS on December 6.
Lifeboats on board the FS Scandinavia, May 2006And on December 13: Contrary Indicators of Psychological Safety: I
To take the risks that learning and practicing new ways requires, we all need a sense that trial-and-error approaches are safe. Organizations seeking to improve processes would do well to begin by assessing their level of psychological safety. Available here and by RSS on December 13.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.