Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 40;   October 4, 2023: Self-Importance and Conversational Narcissism at Work: I

Self-Importance and Conversational Narcissism at Work: I

by

Conversational narcissism is a set of behaviors that participants use to focus the exchange on their own self-interest rather than the shared objective. This post emphasizes the role of these behaviors in advancing the participant's sense of self-importance.
A blue peacock of India

A blue peacock of India, displaying its plumage. Such displays are typical of courtship behavior. It has long been believed that they serve as sexual attractors, as first proposed by Charles Darwin. But a more recent hypothesis is that the burden of producing and maintaining such plumage is evidence of physical fitness.

The fitness hypothesis might also apply to the human behavior described here as conversational narcissism. Demonstrating superiority in one-upmanship exchanges might be taken by others as an indicator of fitness, which is useful in the workplace for determining how to fill critical roles.

Conversational narcissism is a set of behaviors exhibited by participants in a conversation who want to focus the exchange onto themselves. [Derber 1983] [Vangelisti 1990] [Derber 2000] Conversational narcissists do this without showing significant interest in topics related to other participants.

Conversational narcissism can appear in any conversation, but it's of special interest to organizations. For the context of organizational interactions, conversational narcissism can elevate the risk of discussions producing invalid or suboptimal results, because the pattern can cause the conversation to focus on an individual and his or her needs in place of organizational interests.

In this post and posts to come, I describe the pattern and the behaviors people exhibit when they exploit conversations and participants for objectives that differ from the then-current focus.

Four themes of conversational narcissism

As Vangelisti, Knapp, and Daly have shown, we can describe narcissism itself, and the behaviors that comprise conversational narcissism, in terms of four themes — self-importance, exploitation, exhibitionism, and impersonal relationships. [Vangelisti 1990] In this post and the next, I explore the variety of narcissistic behaviors that indicate conversational narcissism is afoot, and which are associated with self-importance. In posts to come I'll address the behaviors that can be categorized as associated with, respectively, exploitation, exhibitionism, and impersonal relationships.

The patterns of conversational narcissism that are associated with a sense of self-importance

Note 1 In what follows, I use the term abuser to refer to the person exhibiting the narcissistic behavior. I'm compelled to use this term instead of a more oobvious choice, narcissist, because the conversation participant who's exhibiting a narcissistic behavior might not be a narcissist.

Note 2 In what follows, I describe someone as "having the talking stick" if he or she is the person who is acknowledged as the current speaker by the conversation participants.

With respect We can describe narcissism and the
behaviors that comprise conversational
narcissism, in terms of four themes:
self-importance, exploitation, exhibitionism,
and impersonal relationships
to a given conversational context, and possibly with respect to a broader context, abusers harbor a self-image they find unsatisfactory. To address their discomfort, they construct a false but grandiose image that they must validate by observing its effects on the other conversation participants. This exaggerated sense of self-importance leads them to employ tactics described in this post and the next.

Narcissistic questioning
Most people ask questions because they're seeking information or clarification. Narcissistic questioning is different. The abuser asks questions not to gain information, nor to elicit clarification, but to demonstrate superior knowledge about the topic of the question. Ideally, in the abuser's mind, the person questioned will be unable to respond, or might even request elucidation before framing a response.
Backdoor bragging
To indulge in backdoor bragging is to articulate a statement or question that contains, in a subordinate form, information intended to burnish the abuser's image, or otherwise indicate the importance or elevated stature of the abuser. Example: "It's painful for me to attend her meetings, because my own are so much more orderly and effective."
Filibustering
When the abuser acquires the talking stick, you had best settle in for the long haul. Abusers know that the time allocated to any given conversation is finite, and when the abuser isn't speaking, someone else will be speaking. So, when making contributions, abusers employing the filibuster tactic aim to consume as much conversation time as possible by including irrelevant detail, or by speaking slowly, or by any other means that comes to mind.
Dismissing others' contributions
By disparaging the contributions of other participants, abusers elevate their own contributions by comparison. If successful, the conversation participants will necessarily spend less time focused on the disparaged contributions, which makes more time available for considering the contributions of the abusers.
Creating pseudofacts from thin air
By repeatedly presenting opinions — or actual lies — as undisputed facts, the abuser can convert baseless assertions into facts in the minds of some of the other participants. Call these assertions pseudofacts. This strategy is most useful if the pseudofacts support the abuser's claims that contributions of others are unworthy of serious consideration.

Last words

The five patterns described above are not alone. Next time I examine eight more that are associated with self-importance. First in this series   Next in this series Go to top Top  Next issue: Self-Importance and Conversational Narcissism at Work: II  Next Issue

101 Tips for Effective MeetingsDo you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Derber 1983]
Charles Derber. The pursuit of attention: power and individualism in everyday life Reprint Edition. Oxford University Press, 1983. Order from Amazon.com. Back
[Vangelisti 1990]
Anita L. Vangelisti, Mark L. Knapp, and John A. Daly. "Conversational narcissism." Communications Monographs 57:4 (1990), pp. 251-274. Available here. Retrieved 16 September 2023. Back
[Derber 2000]
Charles Derber. The pursuit of attention: Power and ego in everyday life (second edition). Order from Amazon.com Oxford University Press, 2000. Back

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

Detour SignHow We Avoid Making Decisions
When an important item remains on our To-Do list for a long time, it's possible that we've found ways to avoid facing it. Some of the ways we do this are so clever that we may be unaware of them. Here's a collection of techniques we use to avoid engaging difficult problems.
Congessman Darryl Issa (R-CA)When the Chair Is a Bully: II
Assertiveness by chairs of meetings isn't a problem in itself, but it becomes problematic when the chair's dominance deprives the meeting of contributions from some of its members. Here's Part II of our exploration of the problem of bully chairs.
Balancing talk time and the value of the contributionVirtual Blowhards
Controlling meeting blowhards is difficult enough in face-to-face meetings, but virtual meetings present next-level problems, because techniques that work face-to-face are unavailable. Here are eight tactics for dealing with virtual blowhards.
A schematic of a symmetric virtual meetingThe Six Dimensions of Online Disinhibition: I
The online environment has properties that cause us to relax the inhibitions that keep us civil. And that leads to an elevated incidence of toxic conflict in public cyberspace. But workplace cyberspace is different. There is reason for optimism there.
The Arc de Triomphe in ParisExploitation and Conversational Narcissism at Work: II
Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are six examples that emphasize exploitation of others.

See also Effective Meetings and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

Saturn during equinox — a composite of natural-color images from CassiniComing May 22: Rescheduling Collaborative Work
Rescheduling is what we do when the schedule we have now is so desperately unachievable that we must let go of it because when we look at it we can no longer decide whether to laugh or cry. The fear is that the new schedule might come to the same end. Available here and by RSS on May 22.
The Leonard P. Zakim Bunker Hill BridgeAnd on May 29: Rescheduling: Project Factors
Rescheduling is what we do when we can no longer honor the schedule we have now. Of all causes of rescheduling, the more controllable are those found at the project level. Attending to them in one project can limit their effects on other projects. Available here and by RSS on May 29.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.