
A common image of bullying in action. But bullying doesn't always show its face so clearly. "You can't control what you can't see" is just one small part of the problem.
As even a quick survey of authoritative sources demonstrates, there is no universally accepted definition of bullying, much less workplace bullying. (They do differ.) One of the causes of this predicament is likely the open prevalence of school bullying in the lives of children (birth to 18 years), compared to the sophisticated and covert approaches favored by adult perpetrators in the workplace, in domestic settings, and elsewhere. But beyond the degree of openness, bullying among children and bullying among adults at work differ in ways that make for difficulties if we try to manage workplace bullying as if it were the same as school bullying.
Defining bullying
The most widely accepted definition of bullying among children is that bullying is "…aggressive behavior or intentional 'harm doing,' which is carried out repeatedly and over time in an interpersonal relationship characterized by an imbalance of power." [Volk, et al. 2014] [Olweus & Pellegrini 1993] As for definitions of workplace bullying, my own is that workplace bullying is any aggressive behavior, associated with work, and primarily intended to cause physical or psychological harm to others. [Brenner 2022.2] This definition closely tracks Randall's definition of adult bullying: "Bullying is the aggressive behavior arising from the deliberate intent to cause physical or psychological distress to others." [Randall 1997]
So we see Definitions of bullying among children require
a pattern of repetition over time in the context
of an imbalance of power. These factors are
less important in bullying among adults.that the main differences between definitions of bullying among children and definitions of bullying among adults in the workplace is that definitions of child bullying require a pattern of repetition over time in the context of an imbalance of power. Close examination of these two factors is therefore worthwhile. I begin with the imbalance of power, and address the pattern of repetition next time.
Imbalance of power
Imbalance of power is a defining element of bullying among children, where power is largely based on age and size. These factors are as dominant as they are, in part, because they are readily observable. That is, a child intent on bullying another child can easily assess the power of potential targets by visual observation.
From the aspiring bully's perspective, assessing the degree of power imbalance in workplace bullying is more complicated. Assessing the degree of the bully's advantage in power over the power of a candidate target is possible, but often requires contextual information that isn't available by visual observation. Moreover, in workplace bullying the degree of power imbalance can change without notice.
For these reasons and others, workplace bullying can occur when there is no imbalance of power, or when the target is more powerful than the bully. [Susskind 2022] Definitions of workplace bullying that require an imbalance of power are therefore too narrow.
Consequences of requiring an imbalance of power
Organizations that deploy anti-bullying policies must necessarily define workplace bullying. If the definition requires an imbalance of power between perpetrator and target, the phrase imbalance of power is usually interpreted to mean that the perpetrator is more powerful than the target. This interpretation excludes from consideration the following situations.
- Covert bullying
- When the bully takes steps to conceal the bullying, careful definitions of bullying have little relevance for the effectiveness of anti-bullying policies, because secrecy limits policy effectiveness. In covert bullying, the degree of power imbalance has little direct effect. [Praslova, et al. 2022] See "Covert Bullying," Point Lookout for January 13, 2010.
- Perpetrator less powerful than the target
- Sometimes called contra-power bullying, contra-bullying, or lateral bullying, this configuration is certainly less common than conventional bullying. Because of our bias against the unfamiliar, compounded with the shame associated with targets acknowledging their being bullied, we tend to overlook bullying situations for extended periods. See "Unrecognized Bullying: II," Point Lookout for February 12, 2020.
- Bullying by proxy
- In bullying by proxy, the proxy perpetrator can have formal power subordinate to that of the target. The bullying can be effective, though, when the primary perpetrator is more powerful than the target. See "Bullying by Proxy: I," Point Lookout for October 19, 2022.
- Virtual bullying or cyber-bullying
- In virtual bullying or cyber-bullying the bullying can occur outside the context of work, even though the bullying is associated with work. Because the perpetrator and target might not know each other in the workplace context, their relative power status might not be a factor in the bullying.
Last words
Bullying configurations can be complicated. Examples: cyber-bullying by proxy, lateral bullying by proxy, and lateral cyber-bullying. Further complexity arises, as I note next time, when we consider patterns of repetition. Next issue in this series
Top
Next Issue
Is a workplace bully targeting you? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just . Order Now!
Footnotes
Your comments are welcome
Would you like to see your comments posted here? rbrenfHlRlTgqCIXkUHBTner@ChacrEuHRQPYVKkOucGfoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Workplace Bullying:
Hurtful Clichés: I
- Much of our day-to-day conversation consists of harmless clichés: "How goes it?" or
"Nice to meet you." Some other clichés aren't harmless, but they're so common that
we use them without thinking. Maybe it's time for some thought.
Social Isolation and Workplace Bullying
- Social isolation is a tactic widely used by workplace bullies. What is it? How do bullies use it? Why
do bullies use it? What can targets do about it?
Look Where You Aren't Looking
- Being blindsided by an adverse event could indicate the event's sudden, unexpected development. It can
also indicate a failure to anticipate what could have been reasonably anticipated. How can we improve
our ability to prepare for adverse events?
Covert Verbal Abuse at Work
- Verbal abuse at work uses written or spoken language to disparage, disadvantage, or harm others. Perpetrators
favor tactics they can subsequently deny having used. Even more favored are abusive tactics that are
so subtle that others don't notice them.
Online Ethics
- The array of media for exchanging our thoughts in text has created new opportunities for acting unethically.
Cyberbullying is one well-known example. But sending text is just one way to cross the line ethically.
Here are some examples of alternatives.
See also Workplace Bullying and Workplace Bullying for more related articles.
Forthcoming issues of Point Lookout
Coming April 23: On Planning in Plan-Hostile Environments: I
- In most organizations, most of the time, the plans we make run into little obstacles. When that happens, we find workarounds. We adapt. We flex. We innovate. But there are times when whatever fix we try, in whatever way we replan, we just can't make it work. We're working in a plan-hostile environment. Available here and by RSS on April 23.
And on April 30: On Planning in Plan-Hostile Environments: II
- When we finally execute plans, we encounter obstacles. So we find workarounds or adjust the plans. But there are times when nothing we try gets us back on track. When this happens for nearly every plan, we might be working in a plan-hostile environment. Available here and by RSS on April 30.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenfHlRlTgqCIXkUHBTner@ChacrEuHRQPYVKkOucGfoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
Recommend this issue to a friend
Send an email message to a friend
rbrenfHlRlTgqCIXkUHBTner@ChacrEuHRQPYVKkOucGfoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
