Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 5, Issue 18;   May 4, 2005: Email Antics: IV

Email Antics: IV

by

Nearly everyone I know complains that email is a real time waster. Yet much of the problem results from our own actions. Here's Part IV of a little catalog of things we do that help waste our time.
Thor's Hammer, Bryce Canyon National Park, Utah, USA

Thor's Hammer, Bryce Canyon National Park, Utah, USA. Courtesy U.S. National Park Service.

When we waste time with email because of our own actions, complaining bitterly about it doesn't make much sense. To get control of email, we have to change how we work with it. Here's Part IV of a little catalog of ways to waste time with email. See "Email Antics: III," Point Lookout for January 14, 2004, for more.

Gossip about people in a message, then accidentally send it to them, too
Gossiping in email is dangerous. Even if you don't accidentally send the gossip to the wrong people, someone else can, at any time. It's called the "Forward" button.
Assume that the sender is the actual sender
Most often, the From does contain the actual sender's name and address. But there are viruses, spammers, and others in the world who know how to "spoof" the From, with malice in mind. Before you launch a tirade, consider whether the person in the From really is the sender.
Age your inbox
Aging a message in your inbox before answering might be OK, but would you like one of your urgent queries to be treated that way? Your delaying might be a serious inconvenience to your correspondent. If you really are so busy that you can't reply fully, send a short note explaining the delay and estimating when you can respond.
Print a message before reading
Unless you Humor is culture-specific,
and often personal.
Tag your humor somehow.
have a health reason for printing before reading, get used to the twenty-first century. Learn to read directly from your display. If your display is hard to read, change the default font and colors to something you like better. After you've read the message, you can print it if it's important enough. Most of the truly important messages still come to you on paper anyway.
Forget that humor is cultural — even microcultural
Humor is culture-specific, and often personal. That's why we so often disagree about what (or who) is funny. Assume that some people won't understand your humor, or worse, that they'll understand it but don't think it's funny. Tag your humor somehow — smileys work pretty well. Seriously. ;^)
Use sarcasm
Sarcasm is usually obvious in live conversation, when we can use voice tone, body language, and facial expressions to signal the sarcasm. In email, sarcasm is dangerous, because the tone of the voice in your head as you write isn't attached to the message. The consequences of misunderstanding can be truly horrible. If you must use sarcasm, indicate it in some explicit way, such as: <Begin sarcasm>attaching to the message a drawing of a hammer that recipients can use to hit themselves over the head until they get it<End sarcasm>.

If you do some of these, and you'd like to stop, tack this list on your wall. Highlight the ones you want to avoid, and review it once in a while to see how you're doing. Be patient, expect lapses, and celebrate your victories. First in this series  Go to top Top  Next issue: Nine Positive Indicators of Negative Progress  Next Issue

101 Tips for Writing and Managing EmailAre you so buried in email that you don't even have time to delete your spam? Do you miss important messages? So many of the problems we have with email are actually within our power to solve, if we just realize the consequences of our own actions. Read 101 Tips for Writing and Managing Email to learn how to make peace with your inbox. Order Now!

Where There's Smoke There's EmailAnd if you have organizational responsibility, you can help transform the culture to make more effective use of email. You can reduce volume while you make content more valuable. You can discourage email flame wars and that blizzard of useless if well-intended messages from colleagues and subordinates. Read Where There's Smoke There's Email to learn how to make email more productive at the organizational scale — and less dangerous. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenPWJqtMZMVijDvCgBner@ChaczuDRYTfwatuXlMQuoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Communication at Work:

Circular reasoningBegging the Question
Begging the question is a common, usually undetected, rhetorical fallacy. It leads to unsupported conclusions and painful places we just can't live with. What can we do when it happens?
Which came first — the chicken or the egg?Dealing with Condescension
Condescending remarks hurt. When we feel that pain, we often feel the urge to retaliate, even when retaliation might not be appropriate. Our responses are more effective when we understand where condescending remarks come from.
In the conference roomInterviewing the Willing: Strategy
At times, we need information from each other. For example, we want to learn about how someone approached a similar problem, or we must interview someone about system requirements. Yet, even when the source is willing, we sometimes fail to expose critical facts. How can we elicit information from the willing more effectively?
One site auditing a virtual presentationVirtual Presentations
Modern team efforts almost certainly involve teleconferences, and many teleconferences include presentations, often augmented with video or graphics. Delivering these virtual presentations effectively requires an approach tailored to the medium.
A tensile failure of a bottom chord in a covered bridgeThe Problem of Work Life Balance
When we consider the problem of work life balance, we're at a disadvantage from the start. The term itself is part of the problem.

See also Effective Communication at Work and Writing and Managing Email for more related articles.

Forthcoming issues of Point Lookout

Jeffrey Skilling, in a mug shot taken in 2004 by the United States Marshals ServiceComing May 23: Narcissistic Behavior at Work: IX
An arrogant demeanor is widely viewed as a hallmark of the narcissist. But truly narcissistic arrogance is off the charts. It's something beyond the merely annoying arrogance of a sometimes-obnoxious individual. What is narcissistic arrogance and how can we cope with it? Available here and by RSS on May 23.
The end of the line for a railroad trackAnd on May 30: Chronic Peer Interrupters: I
When making contributions to meeting discussions, we're sometimes interrupted. Often, the interruption is beneficial and saves time. But some people constantly interrupt their peers or near peers, disrespectfully, in a pattern that compromises meeting outcomes. How can we deal with chronic peer interrupters? Available here and by RSS on May 30.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenuMnqDuUBavSviOXVner@ChacNAyzEicBSdrvNNeRoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Technical Debt Management: Making the Business Case
This Technical Debt Management: Making the Business Caseprogram outlines the steps necessary for deploying a program for rational management of technical debt. For many organizations, adopting a program for rationally managing technical debt entails organizational change. And unlike some organizational changes, this one touches almost everyone in the organization, because technical debt isn't merely a technical problem. Technical debt manifests itself in technological assets, to be sure, but its causes are rarely isolated to the behavior and decisions of engineers. We can't resolve the problem of chronically excessive levels of technical debt by changing the behavior of engineers alone. Technical debt is the symptom, not the problem. In this program we outline the essential elements of an effective business case for adopting a rational technical debt management program. But this business case, unlike many business cases, cannot be captured in a document. We must make the case not only at the leadership level of the organization, but also at the level of the individual contributor. Everyone must understand. Everyone must contribute. We explore five issues that make technical debt so difficult to manage, and develop five guidelines for designing technical debt management strategies for the modern enterprise. Read more about this program. Here's a date for this program:

The Race to the South Pole: The Power of Agile Development
On 14The Race to the Pole: An Application of Agile Development December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. Lessons abound. Among the more important lessons are those that demonstrate the power of the agile approach to project management and product development. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
101 Tips for Managing ConflictFed up with tense, explosive meetings? Are you the target of a bully? Learn how to make peace with conflict.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.