Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 48;   November 29, 2023: Off-Putting and Conversational Narcissism at Work: II

Off-Putting and Conversational Narcissism at Work: II

by

Having off-putting interactions is one of four themes of conversational narcissism. Here are five behavioral patterns that relate to off-putting interactions and how abusers employ them to distract conversation participants from the matter at hand.
A man with a beard. Not exactly a friendly visage.

A man with a beard. Not exactly a friendly visage. Image by Christopher Luther on Unsplash.

The act of connecting with others, or as Satir would say, making contact [Satir 1976], is "kryptonite" for conversational narcissists. They avoid it, and when they can't avoid making contact, they act to limit its duration and effects. They do engage in interpersonal interaction, but they limit its intimacy by engaging in ways that most would experience as off-putting.

This exploration of conversational narcissism began with "Self-Importance and Conversational Narcissism at Work: I," Point Lookout for October 4, 2023, with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or along directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions, biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.

As noted in earlier posts, the methods used can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post continues an exploration of the narcissistic behaviors that are most closely associated with impersonal relationships.

A bit of terminology

Following the When someone enters our personal space,
especially unexpectedly, we might fold our
arms. This is a defensive and comforting
stance that is an example of an adaptor.
pattern of previous posts in this series, I begin with some introductory information, repeated here for convenience. If you recall those earlier posts well enough, you can skip this next bit.

In the first post of this series I introduced the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. In general, it's the behavior that's narcissistic, not the person exhibiting the behavior (though some who exhibit the behavior are narcissists).

In these posts, I describe someone as "having the talking stick" if he or she is the person whom the conversation participants acknowledge as the current speaker. (The term speaker won't do, because someone else might be speaking too.)

Five patterns of conversational narcissism that are associated with distracting other participants

Guided by the work of Vangelisti, et al., I've collected 17 different patterns abusers use and which are associated with impersonal relationships. [Vangelisti 1990] Although Vangelisti, et al., use the term impersonal relationships to refer to this theme, I prefer off-putting interactions. My preference arises from my desire that the term be applicable not only to interactions between people who do have a working relationship of some kind, but also to interactions between people who don't have much of a relationship beyond the incident at hand. This might occur, for example, in the (relatively common) case of a cross-functional team or task force comprised of people who work together only rarely. Another example: making a case to a governance panel for a waiver of policy.

In a previous post I described six off-putting behaviors abusers use to create and maintain distance between themselves and other conversation participants. Those patterns relate to the way abusers respond to the contributions of other conversation participants. In this post I describe five more patterns. These patterns relate to how abusers' behavior distracts other participants from the matter at hand.

Exhibiting distracting adaptors
When we're feeling uncomfortable in a situation, we tend to try to restore a sense of comfort. Among the tactics we use are those called adaptors. [Ekman 1969] Adaptors are non-verbal. For example, when someone enters our personal space, especially unexpectedly, we might fold our arms. This is a defensive and comforting stance. It's an example of an alter-adaptor, sometimes called an other-adaptor. The three types of adaptors — self-adaptors, alter-adaptors, and object-adaptors — all involve some kind of touching. Respectively, they're responses to something about oneself, another person, or an object. Adaptors don't communicate any particular message, and they usually occur outside the awareness of the people exhibiting them.
Along with the fidgeting movements that we interpret as signs of nervousness, we tend to "read" an abuser's adaptors as indicators of anxiety in the abuser. Making such interpretations can make us uncomfortable — they're off-putting. So an abuser who feels nervous or who feels uncomfortable because the group's focus is on someone else might resort to using adaptors, which, in turn, makes other conversation participants feel uncomfortable. This dynamic pulls the entire conversation away from its objective, with everyone feeling uncomfortable, until the abuser finds comfort either by turning the focus onto themselves or a topic more preferred, or by some other method, or by exiting the conversation.
Displaying impatience with others
When someone other than the abuser has the talking stick, the abuser regards the situation as a problem to be solved, because the talking stick is essential for controlling the conversation. There is no time for patience or courtesy. Displaying impatience is one way to demand the talking stick. But the display serves another purpose less obvious. Displaying impatience deters other conversation participants from reaching for the talking stick, because they realize that being next to speak invites open conflict with the abuser.
Scanning beyond the conversation
In a room that contains multiple simultaneous conversations, scanning behavior involves assessing other conversations from afar, usually one-by-one. For the abuser, the assessment can determine which conversations might be most vulnerable to being repointed into some direction more to the abuser's liking. A reliable assessment might require that the abuser process both visual and auditory samples. The consequence of such scanning is a change in the abuser's affect. Abusers engaged in scanning seem to be obviously inattentive to the conversation they're attached to. Other participants in that conversation, recognizing that the abuser is searching for more interesting ground, often take offense.
Chasing squirrels
One definition of squirrelly is, "inclined to rush this way and that unpredictably," a sense that has been in use for many decades. [Harper 2023] A tactic abusers might deploy is to "go squirrely," or as some say, "chase squirrels." It involves interjecting an irrelevant comment at what seems to be a random time. "Look! A rainbow!" Or, as in the Disney/Pixar film, Up!, calling out "Squirrel!." The effect is striking. The conversation almost certainly retargets itself to whatever the abuser evoked. Some participants resent this tactic, but many just follow along. In any case, the abuser will have taken over the conversation.
Interacting with devices
One form of distraction unavailable until more recently than the work of Vangelisti, et al., is the personal electronic device — smartphones, computers, tablets, and their much earlier audio-only predecessors. Abusers dissatisfied with the present conversation can easily tune it out and engage with their devices. More significant, perhaps, is the message they communicate to other conversation participants by doing so. Engaging with a personal device has an effect like some combination scanning beyond the conversation and displaying impatience with others. And if the abuser uses the device to communicate with other conversation participants, the effect is enhanced, because it establishes a second e-conversation that competes with the face-to-face conversation.

Last words

These posts have been assuming, implicitly, that the conversation in question is a face-to-face conversation. But all the tactics described have virtual analogs. We can explore the possibilities by positing a virtual conversation, and devising descriptions of virtual conversational narcissistic tactics.

In next week's post I'll examine six more patterns abusers use to distance themselves from other conversation participants. Those patterns relate to how abusers use cameras and how they ask questions to control the behavior of other conversation participants. First in this series   Next in this series Go to top Top  Next issue: Off-Putting and Conversational Narcissism at Work: III  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Satir 1976]
Virginia Satir. Making Contact. Milbrae, California: Celestial Arts, 1976. Order from Amazon.com. Back
[Vangelisti 1990]
Anita L. Vangelisti, Mark L. Knapp, and John A. Daly. "Conversational narcissism." Communications Monographs 57:4 (1990), pp. 251-274. Available here. Retrieved 16 September 2023. Back
[Ekman 1969]
Paul Ekman and Wallace V. Friesen. "The repertoire of nonverbal behavior: Categories, origins, usage, and coding," semiotica 1.1 (1969), pp. 49-98. Available here. Retrieved 10 November 2023. Back
[Harper 2023]
Douglas Harper. The Online Etymology Dictionary/Available here. Retrieved 11 November 2023. Back

Your comments are welcome

Would you like to see your comments posted here? rbrenIyeJIiAfnGdKlUXrner@ChacsxirZwZlENmHUNHioCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

Budget and ScheduleGames for Meetings: IV
We spend a lot of time and emotional energy in meetings, much of it engaged in any of dozens of ritualized games. Here's Part IV of a little catalog of some of our favorites, and what we could do about them.
Handbill for the exhibition of Manet's The Execution of Emperor MaximilianHave a Program, Not Just an Agenda
In the modern organization, it's common to have meetings in which some people have never met — and some never will. For these meetings, which are often telemeetings, an agenda isn't enough. You need a program.
Elephants fightingHow to Waste Time in Meetings
Nearly everyone hates meetings. The main complaint: they're mostly a waste of time. The main cause: us. Here's a field manual for people who want to waste even more time.
Stones: many, many stones.Stone-Throwers at Meetings: I
One class of disruptions in meetings includes the tactics of stone-throwers — people who exploit low-cost tactics to disrupt the meeting and distract all participants so as to obstruct progress. How do they do it, and what can the meeting chair do?
A schematic of a symmetric virtual meetingThe Six Dimensions of Online Disinhibition: I
The online environment has properties that cause us to relax the inhibitions that keep us civil. And that leads to an elevated incidence of toxic conflict in public cyberspace. But workplace cyberspace is different. There is reason for optimism there.

See also Effective Meetings and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

What most of us think of when we think of checklistsComing February 28: Checklists: Conventional or Auditable
Checklists help us remember the steps of complex procedures, and the order in which we must execute them. The simplest form is the conventional checklist. But when we need a record of what we've done, we need an auditable checklist. Available here and by RSS on February 28.
Adolf Hitler greets Neville Chamberlain at the beginning of the Bad Godesberg meeting on 24 September 1938And on March 6: Six More Insights About Workplace Bullying
Some of the lore about dealing with bullies at work isn't just wrong — it's harmful. It's harmful in the sense that applying it intensifies the bullying. Here are six insights that might help when devising strategies for dealing with bullies at work. Example: Letting yourself be bullied is not a thing. Available here and by RSS on March 6.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenIyeJIiAfnGdKlUXrner@ChacsxirZwZlENmHUNHioCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.