When we waste time with email because of our own actions, complaining bitterly about it doesn't make much sense. To get control of email, we have to change how we work with it. Here's Part IV of a little catalog of ways to waste time with email. See "Email Antics: III," Point Lookout for January 14, 2004, for more.
- Gossip about people in a message, then accidentally send it to them, too
- Gossiping in email is dangerous. Even if you don't accidentally send the gossip to the wrong people, someone else can, at any time. It's called the "Forward" button.
- Assume that the sender is the actual sender
- Most often, the From does contain the actual sender's name and address. But there are viruses, spammers, and others in the world who know how to "spoof" the From, with malice in mind. Before you launch a tirade, consider whether the person in the From really is the sender.
- Age your inbox
- Aging a message in your inbox before answering might be OK, but would you like one of your urgent queries to be treated that way? Your delaying might be a serious inconvenience to your correspondent. If you really are so busy that you can't reply fully, send a short note explaining the delay and estimating when you can respond.
- Print a message before reading
- Unless you Humor is culture-specific,
and often personal.
Tag your humor somehow.have a health reason for printing before reading, get used to the twenty-first century. Learn to read directly from your display. If your display is hard to read, change the default font and colors to something you like better. After you've read the message, you can print it if it's important enough. Most of the truly important messages still come to you on paper anyway.
- Forget that humor is cultural — even microcultural
- Humor is culture-specific, and often personal. That's why we so often disagree about what (or who) is funny. Assume that some people won't understand your humor, or worse, that they'll understand it but don't think it's funny. Tag your humor somehow — smileys work pretty well. Seriously. ;^)
- Use sarcasm
- Sarcasm is usually obvious in live conversation, when we can use voice tone, body language, and facial expressions to signal the sarcasm. In email, sarcasm is dangerous, because the tone of the voice in your head as you write isn't attached to the message. The consequences of misunderstanding can be truly horrible. If you must use sarcasm, indicate it in some explicit way, such as: <Begin sarcasm>attaching to the message a drawing of a hammer that recipients can use to hit themselves over the head until they get it<End sarcasm>.
If you do some of these, and you'd like to stop, tack this list on your wall. Highlight the ones you want to avoid, and review it once in a while to see how you're doing. Be patient, expect lapses, and celebrate your victories. First in this series Top Next Issue
Are you so buried in email that you don't even have time to delete your spam? Do you miss important messages? So many of the problems we have with email are actually within our power to solve, if we just realize the consequences of our own actions. Read 101 Tips for Writing and Managing Email to learn how to make peace with your inbox. Order Now!
And if you have organizational responsibility, you can help transform the culture to make more effective use of email. You can reduce volume while you make content more valuable. You can discourage email flame wars and that blizzard of useless if well-intended messages from colleagues and subordinates. Read Where There's Smoke There's Email to learn how to make email more productive at the organizational scale — and less dangerous. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenPWJqtMZMVijDvCgBner@ChaczuDRYTfwatuXlMQuoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Effective Communication at Work:
- Begging the Question
- Begging the question is a common, usually undetected, rhetorical fallacy. It leads to unsupported conclusions
and painful places we just can't live with. What can we do when it happens?
- Dealing with Condescension
- Condescending remarks hurt. When we feel that pain, we often feel the urge to retaliate, even when retaliation
might not be appropriate. Our responses are more effective when we understand where condescending remarks
- Interviewing the Willing: Strategy
- At times, we need information from each other. For example, we want to learn about how someone approached
a similar problem, or we must interview someone about system requirements. Yet, even when the source
is willing, we sometimes fail to expose critical facts. How can we elicit information from the willing
- Virtual Presentations
- Modern team efforts almost certainly involve teleconferences, and many teleconferences include presentations,
often augmented with video or graphics. Delivering these virtual presentations effectively requires
an approach tailored to the medium.
- The Problem of Work Life Balance
- When we consider the problem of work life balance, we're at a disadvantage from the start. The term
itself is part of the problem.
Forthcoming issues of Point Lookout
- Coming May 23: Narcissistic Behavior at Work: IX
- An arrogant demeanor is widely viewed as a hallmark of the narcissist. But truly narcissistic arrogance is off the charts. It's something beyond the merely annoying arrogance of a sometimes-obnoxious individual. What is narcissistic arrogance and how can we cope with it? Available here and by RSS on May 23.
- And on May 30: Chronic Peer Interrupters: I
- When making contributions to meeting discussions, we're sometimes interrupted. Often, the interruption is beneficial and saves time. But some people constantly interrupt their peers or near peers, disrespectfully, in a pattern that compromises meeting outcomes. How can we deal with chronic peer interrupters? Available here and by RSS on May 30.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenuMnqDuUBavSviOXVner@ChacNAyzEicBSdrvNNeRoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- Technical Debt Management: Making the Business Case
- This program
outlines the steps necessary for deploying a program for rational management of technical debt. For
many organizations, adopting a program for rationally managing technical debt entails organizational
change. And unlike some organizational changes, this one touches almost everyone in the organization,
because technical debt isn't merely a technical problem. Technical debt manifests itself in technological
assets, to be sure, but its causes are rarely isolated to the behavior and decisions of engineers. We
can't resolve the problem of chronically excessive levels of technical debt by changing the behavior
of engineers alone. Technical debt is the symptom, not the problem. In this program we outline the essential
elements of an effective business case for adopting a rational technical debt management program. But
this business case, unlike many business cases, cannot be captured in a document. We must make the case
not only at the leadership level of the organization, but also at the level of the individual contributor.
Everyone must understand. Everyone must contribute. We explore five issues that make technical debt
so difficult to manage, and develop five guidelines for designing technical debt management strategies
for the modern enterprise. Read more about
this program. Here's a date for this program:
- Wyndham Springfield City Centre, 700 East Adams Street, Springfield,
Illinois 62701: June 12,
Monthly Meeting, Central
Illinois Chapter of the Project Management Institute. Register now.
- Wyndham Springfield City Centre, 700 East Adams Street, Springfield, Illinois 62701: June 12, Monthly Meeting, Central Illinois Chapter of the Project Management Institute. Register now.
- The Race to the South Pole: The Power of Agile Development
- On 14 December 1911, four men led by Roald
Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen
had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished.
As historical drama, why this happened is interesting enough. Lessons abound. Among the more important
lessons are those that demonstrate the power of the agile approach to project management and product
development. Read more about this program. Here's
a date for this program:
- Fifth Third Bank, 5717 Madison Road, Cincinnati, OH 45227:
Monthly Meeting, Cincinnati
chapter of the International Institute of Business Analysis. Register now.
- Fifth Third Bank, 5717 Madison Road, Cincinnati, OH 45227: July 17, Monthly Meeting, Cincinnati chapter of the International Institute of Business Analysis. Register now.
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.