Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 43;   October 25, 2023: Exploitation and Conversational Narcissism at Work: II

Exploitation and Conversational Narcissism at Work: II

by

Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are six examples that emphasize exploitation of others.
The Arc de Triomphe in Paris

The Arc de Triomphe in Paris. It honors those who fought and died for France in the French Revolutionary War and the Napoleonic War. Imagine the feelings you might have as a participant in a military parade under or near the Arc de Triomphe. That feeling might be similar to what an abuser might seek to feel by employing the techniques described here. Image by Lilen23 courtesy Pixabay.

This exploration of conversational narcissism began with "Self-Importance and Conversational Narcissism at Work: I," Point Lookout for October 4, 2023, with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or along directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions — biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.

The methods used can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post continues an exploration of the narcissistic behaviors that are most closely associated with exploiting other participants in the conversation.

A bit of terminology

In that When abusers use "I" statements that
ought properly to be "We" statements,
they seem to the uninitiated to be
leaders or experts when they are not
first post of this series I introduced the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. In general, it's the behavior that is narcissistic, not the person exhibiting the behavior (though some who exhibit the behavior are narcissists).

In what follows, as in the previous posts in this series, I describe someone as "having the talking stick" if he or she is the person whom the conversation participants acknowledge as the current speaker. (The term speaker won't do, because someone else might be speaking too.)

Guided by the work of Vangelisti, et al., I've collected ten different patterns abusers use and which are associated with exploiting other conversation participants. [Vangelisti 1990] I described four patterns last time.

Seven more patterns of conversational narcissism that are associated with exploitation of others

In this post I describe six more patterns abusers use to exploit the other conversation participants. They include contributing aggressively, interrupting, overtalking, talking rapidly, talking continuously, acting as emcee, and using iceberg statements.

Descriptions follow.

Contributing aggressively
When speaking, abusers can employ extended direct eye contact (glaring) to assert dominance over other conversation participants. [Toscano 2018] This behavior can be especially useful to the abuser who regards a particular participant as likely to seize the talking stick or to redirect the conversation.
In face-to-face conversations, glaring at one participant while speaking can be a tool of intimidation. In video conferencing, the analogous tactic is looking into the camera and either prefacing a contribution with one participant's name, or naming that participant repeatedly during the contribution, or both.
Interrupting
Wiemann and Knapp define an interruption as an "…attempt to assume the speaking role before it has been relinquished by the current speaker." [Wiemann 2017] Interrupting is a technique that accomplishes several possible goals of abusers. After acquiring the talking stick, they can filibuster, which helps them consume time, or they can engage in narcissistic questioning, or any number of other maneuvers. But the interruption itself is exploitative, in that it is a statement that the person interrupted is of lesser value than the abuser.
An advanced form of interrupting is interrupting with deniability. To interrupt deniably, the abuser makes a contribution while another participant has merely paused for breath or punctuation. The abuser then presses on, even after the interrupted participant tries to resume after pausing. The interruption is deniable because it appears superficially to be an honest mistake — most participants and witnesses assume that the abuser simply failed to notice that he or she interrupted someone.
Overtalking
Overtalking is the tactic of intentionally beginning to speak, or continuing to speak, to prevent others from speaking or to make them stop if they're already speaking. [Brenner 2013.2] Overtalking also happens when the target of an interruption decides to keep speaking. The interrupter then makes the same choice. Overtalking is another method of dismissing the target's speech as worthless.
Overtalking is equivalent to prefacing a contribution with, "Whatever you're saying is of less value than what I have to say." Many experience overtalking as abuse or bullying.
Abusers find this tactic extraordinarily useful not only for dominating conversations, but also for guiding conversations they don't yet utterly dominate.
Talking rapidly
Involuntary rapid speech is associated with various mental disorders. Talking rapidly, voluntarily, is something else again. It's a tactic abusers employ to create difficulty for auditors in two ways. First, talking rapidly tightens the abuser's hold on the talking stick by creating difficulty for other participants to begin speaking without interrupting the abuser. Second, a high tempo makes grasping the abuser's meaning more difficult, especially if the auditors are less than conversant in the topic. If the topic is arcane or specialized, or if it involves complex arguments, talking rapidly can compel auditors to ask for clarification or elaboration. It's exploitative because it compels auditors to admit that they aren't following. It's another tool of humiliation.
Escalating volume is an option abusers can use to enhance the effect of talking rapidly. It's equivalent to verbal violence. By escalating voice volume when overtalking or talking rapidly, the abuser intends to prevent the target from speaking or even thinking.
Talking continuously
When speaking, many non-abusers pause for breath, or for the conversational equivalent of punctuation, such as commas, periods, or em dashes. To talk continuously, the abuser must master the art of avoiding these pauses and breaks, because they normally serve as cues to others to reach for the talking stick. Instead, abusers pause in mid-thought, which confounds those waiting to speak. Example: "I've never found the M1 highway to <pause> be busy at that hour."
Acting as emcee
Some abusers adopt the role of emcee, offering the talking stick to another participant (or a series of other participants). Example: "Mark, tell us about your trip to D.C." This behavior might be appropriate, even welcome, in some situations, and when executed with grace and generosity. One such situation is hosting a dinner party in which many of the guests aren't well known to each other.
But in an ironic twist, in other circumstances this same behavior can be exploitative. Abusers sometimes recognize in a moment of clarity that they have been abusing the conversation and its participants. One option would be to begin supporting the conversation and its participants in whichever direction they choose. But often the abuser chooses to direct the attention of the participants to one of their number, as an emcee. Their calculation seems to be that directing the group's attention to someone other than themselves serves to acquit the abuser of the charge of abuse. The stratagem fails, because the abuser is now the emcee, which is a form of indirectly directing.
Using iceberg statements
The iceberg is a widely used metaphor for systems that have the property that only a small part of the whole is evident. In the self-help community, an "iceberg statement" is one that indicates that the speaker has a story to tell more significant than the statement itself. By listening for iceberg statements, so the theory goes, the auditor can be more adept at building relationships. [Yee 2013].
Abusers can work this angle in reverse to exploit auditors. By devising iceberg statements, abusers can induce auditors to ask the questions that the abusers can use to steer or dominate the conversation. From the abuser's perspective, the techniques encouraged by the self-help community are free assistance.

Last words

When a skilled abuser deftly exploits other conversation participants, some (or all) of those participants might be unaware of what has occurred. The abuser is satisfied, and the other participants are unaware that they have served the abuser's purpose. But abusers must take care. Some who do recognize the pattern choose not to challenge their abusers. They might have answered in the negative two questions: First, "Is confrontation worth the effort and risk?" And second, "Is the likelihood of a mutually beneficial outcome to the confrontation great enough?" First in this series  Next in this series Go to top Top  Next issue: Exhibitionism and Conversational Narcissism at Work: I  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Vangelisti 1990]
Anita L. Vangelisti, Mark L. Knapp, and John A. Daly. "Conversational narcissism." Communications Monographs 57:4 (1990), pp. 251-274. Available here. Retrieved 16 September 2023. Back
[Toscano 2018]
Hugo Toscano, Thomas W. Schubert, and Steffen R. Giessner. "Eye gaze and head posture jointly influence judgments of dominance, physical strength, and anger," Journal of Nonverbal Behavior 42 (2018), pp. 285-309. Available here. Retrieved 7 October 2023. Back
[Wiemann 2017]
John M. Wiemann and Mark L. Knapp. "Turn-taking in conversations," Communication Theory, 4 (2017), pp. 226-45. Available here. Retrieved 7 October 2023. Back
[Brenner 2013.2]
Richard Brenner. "Overtalking: I," Point Lookout blog, October 16, 2013. Available here. Back
[Yee 2013]
Challen Yee. "How to Build Rapport with a Stranger","Seeking the Narrow Way" blog,December 18, 2013,Available here. Retrieved 6 October 2023. Back

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

A hot potatoGames for Meetings: II
We spend a lot of time and emotional energy in meetings, much of it engaged in any of dozens of ritualized games. Here's Part II of a little catalog of some of our favorites, and what we could do about them.
A tournamentQuestioning Questions
In meetings and other workplace discussions, questioning is a common form of conversational contribution. Questions can be expensive, disruptive, and counterproductive. For most exchanges, there is a better way.
The signing of the Paris Peace AccordsMeta-Debate at Work
Workplace discussions sometimes take the form of informal debate, in which parties who initially have different perspectives try to arrive at a shared perspective. Meta-debate is one way things can go wrong.
A collaboration session in a modern workplaceRationalizing Creativity at Work: I
Much of the work of modern organizations requires creative thinking. But financial and schedule pressures can cause us to adopt processes that unexpectedly and paradoxically suppress creativity, thereby increasing costs and stretching schedules. What are the properties of effective approaches?
President Obama meets with leaders about job creation, December 3, 2009Naming Ideas
Participants in group discussions sometimes reference each other's contributions using the contributor's name. This risks offending the contributor or others who believe the idea is theirs. Naming ideas is less risky.

See also Effective Meetings and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A well-festooned utility poleComing June 26: Additive bias…or Not: I
When we alter existing systems to enhance them, we tend to favor adding components even when subtracting might be better. This effect has been attributed to a cognitive bias known as additive bias. But other forces more important might be afoot. Available here and by RSS on June 26.
A close-up view of a chipseal road surfaceAnd on July 3: Additive bias…Not: II
Additive bias is a cognitive bias that many believe contributes to bloat of commercial products. When we change products to make them more capable, additive bias might not play a role, because economic considerations sometimes favor additive approaches. Available here and by RSS on July 3.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.