Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 3, Issue 39;   September 24, 2003: Devious Political Tactics: Credit Appropriation

Devious Political Tactics: Credit Appropriation

by

Managers and supervisors who take credit for the work of subordinates or others who feel powerless are using a tactic I call Credit Appropriation. It's the mark of the unsophisticated political operator.

Jordan peeked into Stephanie's office, and felt relief when he saw that she was in, sitting as usual with her feet up on her desk, talking into her headset. She waved him in and pointed to a chair. He sat.

A credit thiefAs he waited, Stephanie smiled at him, then rolled her eyes as she wagged her head back and forth, indicating with her usual good humor that the person at the other end of the phone was droning on, and that she had to wait for it to end. Mercifully, it ended after only a minute, and she clicked off. Pulling off her headset, she punched "Do Not Disturb" on the phone. Jordan got up, closed the door, and sat down again. It was becoming their routine.

Stephanie took a pull from the water bottle next to the phone. "OK, spill."

Jordan began, "Joseph lied to Emmons about who did the estimates, and now every time Emmons asks Joseph a question, he tells him 'I'll get back to you,' and then he asks me. I'm sick of this. More than sick."

"What happened now?" Stephanie asked.

Credit appropriation
is the trademark of
the unsophisticated operator
"Just now I find out that Joseph misunderstood Emmons' problem with Marigold's budget, so my latest version wasn't what Emmons wanted. Now Joseph is blaming me."

Jordan is entangled in the consequences of a tactic I call Credit Appropriation. In Credit Appropriation, the appropriator (in this instance, Joseph) takes credit for the work of the target (Jordan), who's usually a subordinate or someone who is or feels vulnerable.

Since credit appropriation is the most obvious, least effective, and perhaps the most common of all political maneuvers, it's the trademark of the unsophisticated operator. Still, it hurts. Here are some tips to keep in mind if an Appropriator targets you.

Be aware
Even if you haven't yet been targeted, the Appropriator will likely get around to you, eventually. Notice patterns of appropriation, not only from your peers, but from the Appropriator's peers, too. Awareness is preparedness.
Watch for blowback
What can be taken can be returned. If the "credit" turns negative, the appropriator is likely to blame you. Resist making modifications or doing any follow-ons to the appropriated work, since these activities can lead to trouble. This is what happened to Jordan.
Complexity is your friend
Seed your work with complexities and nuance that you alone understand. Eventually, the complexity will compel the Appropriator to reveal the work's true author. If the complexity is evident enough, it might even deter appropriation altogether.

Credit Appropriation is the first item in my catalog of Devious Political Tactics — more are coming. Have you found yourself in this situation? Or others? Tell me your story. Making these tactics public — and giving them names — is perhaps the best way to prevent their use. Go to top Top  Next issue: Devious Political Tactics: The False Opportunity  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenHzeUBKIMjYYfpiPnner@ChacucSFarndxZlbsnDnoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

The game of chess, a strategic metaphorNasty Questions: I
Some of the questions we ask each other aren't intended to elicit information from the respondent. Rather, they're poorly disguised attacks intended to harm the respondent politically, and advance the questioner's political agenda. Here's part one a catalog of some favorite tactics.
President Richard Nixon resignsProjection Errors at Work
Often, at work, we make interpretations of the behavior of others. Sometimes we base these interpretations not on actual facts, but on our perceptions of facts. And our perceptions are sometimes erroneous.
A Strangler Fig in AustraliaProjects as Proxy Targets: I
Some projects have detractors so determined to prevent project success that there's very little they won't do to create conditions for failure. Here's Part I of a catalog of tactics they use.
Elia Kazan, award winning film directorOn Snitching at Work: I
Some people have difficulty determining the propriety of reporting violations to authorities at work. Proper or not, reporting violations can be simultaneously both risky and necessary.
Promotional poster for the 1957 film Twelve Angry MenThe Opposite of Influence
The question of why some people are so influential has a partner question: why are others largely ignored, or opposed, even when their contributions are valuable?

See also Workplace Politics, Managing Your Boss and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

A shark of unspecified speciesComing May 2: Narcissistic Behavior at Work: VII
Narcissistic behavior at work prevents trusting relationships from developing. It also disrupts existing relationships, and generates toxic conflict. One class of behaviors that's especially threatening to relationships is disregard for the feelings of others. In this part of our series we examine the effects of that disregard. Available here and by RSS on May 2.
Jump ball in a game of basketballAnd on May 9: Unethical Coordination
When an internal department or an external source is charged with managing information about a large project, a conflict of interest can develop. That conflict presents opportunities for unethical behavior. What is the nature of that conflict, and what ethical breaches can occur? Available here and by RSS on May 9.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenBcKPCSqaBPMoYHWaner@ChacawfXzMXGAZOXSzMroCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.