Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 13, Issue 30;   July 24, 2013: Agenda Despots: II

Agenda Despots: II

by

Some meeting Chairs crave complete or near-complete control of their meeting agendas. In this Part II of our exploration of their techniques, we emphasize methods for managing unwanted topic contributions from attendees.
Bowery men waiting for bread in a bread line in New York City in 1910

Bowery men waiting for bread in a bread line in New York City in 1910. In some cases, the number of men might exceed the supply of bread, but most of the time, the men did actually receive bread. Those subjected to the whims of Agenda Despots, on the other hand, might well find that their contributions to agendas are never accepted. Meeting attendees who must deal with such a situation rapidly become disenchanted and cynical. Some will decline to contribute to discussions of topics that do appear on the agenda. In this way, the damage done by despotic behavior limits not only what topics are discussed, but also the content of the discussions that do occur. Photo available in the George Grantham Bain Collection of the U.S. Library of Congress.

Although Agenda Despots seek complete control of their meetings' agendas, many organizational cultures value openness and collaborative approaches to meeting management. Many Agenda Despots must therefore feign openness to topics contributed by attendees. Here are seven methods for controlling the agenda without seeming to do so.

Abuse the not-agenda
A not-agenda is a list of topics that won't be addressed at the meeting. (See "First Aid for Painful Meetings," Point Lookout for October 24, 2001) Although most meetings don't specify not-agendas, not-agendas can be abused. One method is publishing the not-agenda before soliciting contributions for the agenda, thereby fending off contributions before they're offered.
Freeze the agenda
In this approach, Agenda Despots announce a freeze date after which topic contributions can't be considered. By setting this date early enough, or setting it to precede a significant scheduled news-generating event, the Agenda Despot can exclude disfavored topics that depend on late-breaking news.
Don't solicit agenda contributions
Some attendees need a little nudge before they dare contribute agenda topics. Some need reminders. By failing to provide nudges or reminders, Agenda Despots attenuate the contributed topic stream, and might even prevent disfavored contributions.
Abuse the parking lot
The "parking lot" is a list of topics and issues that arise during the meeting, and which aren't on the agenda. (See "Using the Parking Lot," Point Lookout for September 12, 2007) Parking lot abuse is the systematic ignoring of parked items. They're never addressed. In this way, Agenda Despots can continue to ignore topics that attendees might have contributed for the agenda in advance, and which the Agenda Despot nevertheless excluded from the agenda. If the contributors then raise their excluded topics during the meeting, the Agenda Despot parks them.
Falsely promise inclusion
When contributions do arrive, and one of them is unwelcome, the Agenda Despot can claim, "That topic would fit nicely in <name-of-already-included-topic>," which can mollify the contributor. At the meeting, the contributed topic is treated only cursorily, if at all.
Reject contributions
Rejecting contributions is always possible,Many of these techniques
are active deceptions
but doing so can degrade the Agenda Despot's credibility, especially if he or she has solicited contributions. At times, the price might be worth paying, if the suggested topic is troublesome, and if the Agenda Despot has little credibility left to lose.
Schedule disfavored topics for the end
When Agenda Despots can't exclude from the agenda a suggested but disfavored topic, they can include it in the agenda, but schedule it near the end of the meeting. When earlier topics overrun their allotted times (if time allotments are published at all), the Agenda Despot, with great (but feigned) regret, can announce that "Regrettably, we must postpone this topic to a later date."

Many of these techniques are active deceptions, because they present the Agenda Despots as being open to contributions when in fact they are not. Using the concept of active deception, see how many additional techniques you can devise. First in this series  Go to top Top  Next issue: Virtual Meetings: Indicators of Inattention  Next Issue

101 Tips for Effective MeetingsDo you spendyour days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenwVwiOeXsTTLcfXfIner@ChacPWbSMbJoLXOybbUfoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

A voteDecisions, Decisions: II
Most of us have participated in group decision-making. The process can be frustrating and painful, but it can also be thrilling. What processes do groups use to make decisions?
Heiltskuk Icefield, British ColumbiaFinding the Third Way
When a team is divided, and agreement seems out of reach, attempts to resolve the conflict usually focus on the differences between the contrasting positions. Focusing instead on their similarities can be a productive technique for reaching agreement.
Braided streams in Grewingk Glacier RiverWhy Sidebars Happen
Sidebar conversations between meeting participants, conducted while someone else has the floor, are a distracting form of disorder that can waste time and reduce meeting effectiveness. Why do sidebars happen?
A globe puzzleVirtual Brainstorming: I
When we need to brainstorm, meeting virtually carries a risk that our results might be problematic. Here's Part I of some steps to take to reduce the risk.
Attending a virtual meeting, but disengagedToward More Engaging Virtual Meetings: II
Here's Part II of a set of simple techniques to help virtual meeting facilitators enhance attendee engagement.

See also Effective Meetings and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

Prof. Tom PettigrewComing February 21: The Ultimate Attribution Error at Work
When we attribute the behavior of members of groups to some cause, either personal or situational, we tend to make systematic errors. Those errors can be expensive and avoidable. Available here and by RSS on February 21.
Daffodils of the variety Narcissus 'Barrett Browning'And on February 28: Narcissistic Behavior at Work: I
Briefly, when people exhibit narcissistic behavior they're engaging in activity that systematically places their own interests and welfare ahead of the interests and welfare of anyone or anything else. It's behavior that threatens the welfare of the organization and everyone employed there. Available here and by RSS on February 28.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrensiHWDhTCqxOwGOKFner@ChacafvvFGVJyeZZcniOoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.