Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 5, Issue 18;   May 4, 2005: Email Antics: IV

Email Antics: IV

by

Nearly everyone I know complains that email is a real time waster. Yet much of the problem results from our own actions. Here's Part IV of a little catalog of things we do that help waste our time.
Thor's Hammer, Bryce Canyon National Park, Utah, USA

Thor's Hammer, Bryce Canyon National Park, Utah, USA. Courtesy U.S. National Park Service.

When we waste time with email because of our own actions, complaining bitterly about it doesn't make much sense. To get control of email, we have to change how we work with it. Here's Part IV of a little catalog of ways to waste time with email. See "Email Antics: III," Point Lookout for January 14, 2004, for more.

Gossip about people in a message, then accidentally send it to them, too
Gossiping in email is dangerous. Even if you don't accidentally send the gossip to the wrong people, someone else can, at any time. It's called the "Forward" button.
Assume that the sender is the actual sender
Most often, the From does contain the actual sender's name and address. But there are viruses, spammers, and others in the world who know how to "spoof" the From, with malice in mind. Before you launch a tirade, consider whether the person in the From really is the sender.
Age your inbox
Aging a message in your inbox before answering might be OK, but would you like one of your urgent queries to be treated that way? Your delaying might be a serious inconvenience to your correspondent. If you really are so busy that you can't reply fully, send a short note explaining the delay and estimating when you can respond.
Print a message before reading
Unless you Humor is culture-specific,
and often personal.
Tag your humor somehow.
have a health reason for printing before reading, get used to the twenty-first century. Learn to read directly from your display. If your display is hard to read, change the default font and colors to something you like better. After you've read the message, you can print it if it's important enough. Most of the truly important messages still come to you on paper anyway.
Forget that humor is cultural — even microcultural
Humor is culture-specific, and often personal. That's why we so often disagree about what (or who) is funny. Assume that some people won't understand your humor, or worse, that they'll understand it but don't think it's funny. Tag your humor somehow — smileys work pretty well. Seriously. ;^)
Use sarcasm
Sarcasm is usually obvious in live conversation, when we can use voice tone, body language, and facial expressions to signal the sarcasm. In email, sarcasm is dangerous, because the tone of the voice in your head as you write isn't attached to the message. The consequences of misunderstanding can be truly horrible. If you must use sarcasm, indicate it in some explicit way, such as: <Begin sarcasm>attaching to the message a drawing of a hammer that recipients can use to hit themselves over the head until they get it<End sarcasm>.

If you do some of these, and you'd like to stop, tack this list on your wall. Highlight the ones you want to avoid, and review it once in a while to see how you're doing. Be patient, expect lapses, and celebrate your victories. First in this series  Go to top Top  Next issue: Nine Positive Indicators of Negative Progress  Next Issue

101 Tips for Writing and Managing EmailAre you so buried in email that you don't even have time to delete your spam? Do you miss important messages? So many of the problems we have with email are actually within our power to solve, if we just realize the consequences of our own actions. Read 101 Tips for Writing and Managing Email to learn how to make peace with your inbox. Order Now!
Where There's Smoke There's EmailAnd if you have organizational responsibility, you can help transform the culture to make more effective use of email. You can reduce volume while you make content more valuable. You can discourage email flame wars and that blizzard of useless if well-intended messages from colleagues and subordinates. Read Where There's Smoke There's Email to learn how to make email more productive at the organizational scale — and less dangerous. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenqidoDrMAzuxNZOIzner@ChacUqzIlnCPJDVMICgAoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Communication at Work:

Circular reasoningBegging the Question
Begging the question is a common, usually undetected, rhetorical fallacy. It leads to unsupported conclusions and painful places we just can't live with. What can we do when it happens?
U.S. coinsThe Fine Art of Quibbling
We usually think of quibbling as an innocent swan dive into unnecessary detail, like calculating shares of a lunch check to the nearest cent. In debate about substantive issues, a detour into quibbling can be far more threatening — it can indicate much deeper problems.
A tensile failure of a bottom chord in a covered bridgeThe Problem of Work Life Balance
When we consider the problem of work life balance, we're at a disadvantage from the start. The term itself is part of the problem.
An actual red herringSome Truths About Lies: IV
Extended interviews provide multiple opportunities for detecting lies by people intent on deception. Here's Part IV of our little collection of lie detection techniques.
President Obama meets with leaders about job creation, December 3, 2009Naming Ideas
Participants in group discussions sometimes reference each other's contributions using the contributor's name. This risks offending the contributor or others who believe the idea is theirs. Naming ideas is less risky.

See also Effective Communication at Work and Writing and Managing Email for more related articles.

Forthcoming issues of Point Lookout

Raquel Welch (left) and Gilda Radner (right) from a @Cite{Saturday Night Live rehearsal, April 24, 1976Coming December 20: Conceptual Mondegreens
When we disagree about abstractions, such as a problem solution, or a competitor's strategy, the cause can often be misunderstanding the abstraction. That misunderstanding can be a conceptual mondegreen. Available here and by RSS on December 20.
An engineer attending a meeting with 14 other engineersAnd on December 27: On Assigning Responsibility for Creating Trouble
When we assign responsibility for troubles that bedevil us, we often make mistakes. We can be misled by language, stereotypes, and the assumptions we make about others. Available here and by RSS on December 27.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenkUvTfOQolAdNKYkaner@ChacTNMRuqFYdDYoJyjZoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Person-to-Person Communications: Models and Applications
When Person-to-Person Communications: Models and Applicationswe talk, listen, send or read emails, read or write memos, or when we leave or listen to voice mail messages, we're communicating person-to-person. And whenever we communicate person-to-person, we risk being misunderstood, offending others, feeling hurt, and being confused. There are so many ways for things to go wrong that we could never learn how to fix all the problems. A more effective approach avoids problems altogether, or at least minimizes their occurrence. In this very interactive program we'll explain — and show you how to use — a model of inter-personal communications that can help you stay out of the ditch. We'll place particular emphasis on a very tricky situation — expressing your personal power. In those moments of intense involvement, when we're most likely to slip, you'll have a new tool to use to keep things constructive. Read more about this program. Here's a date for this program:

Ten Project Management Fallacies: The Power of Avoiding Hazards
Most Ten Project Management Fallaciesof what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
101 Tips for Managing ConflictFed up with tense, explosive meetings? Are you the target of a bully? Learn how to make peace with conflict.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.