Lisa barely understood what Craig was saying. It wasn't deep — Craig wasn't all that smart. He was just using his speakerphone, and the sound quality was horrible. "Craig," she said, "I can barely understand you. You on speaker?"
After a click, the hum disappeared, and Craig's voice came on, clearly: "There. Is that better? Sorry, just trying to save my neck."
'Right,' thought Lisa. Then, exasperated but in control, to Craig: "OK. Now. You were saying."
Craig always uses his speakerphone. Maybe he actually is ten times busier than everyone else, and maybe he needs both hands free to do whatever he does when he's talking on the phone. Possibly, though, he likes to send the I'm-too-important-for-this message. If someone calls him on it, he can always claim that he was just trying to save his shoulder, or his neck, or his time. And maybe he is — that's what makes this intimidation tactic deniable.
Here are three more deniable intimidation tactics.
- Space invasion
- We all have personal space around us that we consider our own. Its radius depends in part on our relationship to the people who enter it, and in part on the culture that reared us. Intimidators sometimes enter this space intentionally.
- Your response to space invaders depends on your willingness to violate cultural norms. Whatever you do, be very careful, because the invasion is rarely as obvious to others as it is to you. A strong reaction on your part could appear to others to be unprovoked. It's best to back away before the violation occurs.
- Leaning over and reading your notepad
- People who invade
your personal space
might be trying
to intimidate you
- This is more than a space invasion — it violates our privacy. And it's especially rattling because we don't want to cover the notepad, since that suggests that our notes are sensitive or illicit.
- If you anticipate a "leaner," prepare by having meaningless notes on the top page of your pad. If you actually have to write (or read) anything, write it on (or read it from) an inside page. Flipping pages looks very natural.
- Mispronouncing your name repeatedly
- A variant of this tactic is to repeatedly forget a name. There's no point correcting those who do this regularly — they're either doing it intentionally, or they can't — or won't — remember names.
- You can't control the mispronouncer, but you can control yourself. Breathe. Compose yourself. Consider the incident a warning that you might be dealing with an intimidator.
Intimidators aim for an out-of-control emotional response. When you notice intimidation, let your emotions happen, and seek instead to control what you do when you feel your emotions. Focus on your breathing, or on a bit of wisdom. When you can maintain your balance, you gain access to your power. Top Next Issue
Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenRUlebQZSeaNSiUFzner@ChacTImwZacJiHtOBNHioCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Bullying:
- The Costs of Threats
- Threatening as a way of influencing others might work in the short term. But a pattern of using threats
to gain compliance has long-term effects that can undermine your own efforts, corrode your relationships,
and create an atmosphere of fear.
- How Targets of Bullies Can Use OODA: II
- To make the bullying stop, many targets of bullies try to defend themselves. But defense alone is not
sufficient — someone must make the bully stop. That's why counterattack is much more likely
- Meeting Bullies: Advice for Chairs
- Bullying in meetings is difficult to address, because intervention in the moment is inherently public.
When bullying happens in meetings, what can you do?
- Rapid-Fire Attacks
- Someone asks you a question. Within seconds of starting to reply, you're hit with another question,
or a rejection of your reply. Abusively. The pattern repeats. And repeats again. And again. You're being
attacked. What can you do?
- Seventeen Guidelines About Workplace Bullying
- Bullying is a complex social pattern. Thinking clearly about bullying is difficult in the moment because
our emotions can distract us. Here are some short insights about bullying that are easy to remember
in the moment.
Forthcoming issues of Point Lookout
- Coming April 25: Narcissistic Behavior at Work: VI
- Narcissistic behavior at work distorts decisions, disrupts relationships, and generates toxic conflict. These consequences limit the ability of the organization to achieve its goals. In this part of our series we examine the effects of exploiting others for personal ends. Available here and by RSS on April 25.
- And on May 2: Narcissistic Behavior at Work: VII
- Narcissistic behavior at work prevents trusting relationships from developing. It also disrupts existing relationships, and generates toxic conflict. One class of behaviors that's especially threatening to relationships is disregard for the feelings of others. In this part of our series we examine the effects of that disregard. Available here and by RSS on May 2.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrencXzCNKNnWBYricBFner@ChacngQQJJBKUUXRHhnzoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.