Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 8, Issue 28;   July 9, 2008: Approval Ploys

Approval Ploys

by

If you approve or evaluate proposals or requests made by others, you've probably noticed patterns approval seekers use to enhance their success rates. Here are some tactics approval seekers use.

Approval or denial of proposals or requests can have impact beyond the disposition of the issue at hand. It also has political impact. It can make or break a career, render other projects moot, or doom or create whole lines of business. Since so much can be at stake, approval seekers have an incentive to use all manner of techniques to enhance approval rates. Sometimes these techniques become habitual — they use them whether the stakes are high or low.

A field of Cereal Rye

A field of Cereal Rye (Secale cereale). Unlike other domes­ticated crops, such as wheat and barley, cereal rye was not bred from wild stock by intention. When wheat began to be cultivated in Neolithic times, wild rye was a weed. As a weed, it was enough like wheat to grow in wheat fields. Human farmers would pull the weed when they found it, using visual cues to identify the rye. Inevitably, they would miss a few individual plants, especially those that looked most like wheat. Unintentionally, humans were thus providing selective pressure on the rye population, forcing it over tens and hundreds of generations to evolve to look (among several other favored attributes) more and more like wheat. In time, wild rye "learned" to mimic wheat. This form of species mimicry is called Vavilovian mimicry. Crops bred in this manner by humans are called secondary crops. For a comprehensive explanation of mimicry, see Georges Pasteur: A Classification Review of Mimicry Systems in the Annual Review of Ecology and Systematics, Vol. 13, (1982), pp. 169-199.

In effect, the wild rye was using an approval ploy to obtain the same favored treatment that humans were then bestowing on wheat. By including itself among the wheat plants, it was using a technique identified here as "hiding among sheep." In organizations, the authors of investment opportunities try to configure their opportunities to match as closely as possible their understanding of the pattern the approvers are searching for. The task of the approvers, then, is to separate the wheat from the rye — a task that isnøt always easy. Over time, in any given organization and for any set of players, the task becomes increasingly difficult. The task is easiest in new or newly reconfigured organizations, because the approvers' patterns are less well understood by approval seekers. Beyond organizations, we find analogous mimicry dynamics in securities markets, retail sales and marketing, mortgage origination, the game of poker, and venture investing, among many other domains. Photo courtesy U.S Department of Agriculture.

Approvers and recommenders would do well to recognize these techniques. When they do, they can be more alert to them, and better maintain objectivity. In a politically healthy culture, recommendations of the sophisticated approver are more likely to be based on the merits; in an unhealthy culture, sophisticated approvers are less likely to commit political blunders.

Here are some of the tactics of approval seekers.

Misrepresenting an approval deadline or the narrowness of a "window of opportunity"
When done to create a sense of urgency, this tactic helps them jump the priority queue. But it's also a way to claim resources before other projects are considered, or to reduce the time available for judicious consideration.
Hiding among sheep
Grouping the request with non-controversial requests might make it look more innocent or less risky than it actually is.
Using misleading competitive intelligence
Exaggerating the validity or content of competitive intelligence is especially effective when the approver is fearful about the competitive position of the organization.
Appeals to personal interest
Appealing to the approver's personal interest often helps, despite the obvious implications about the approver's corruptibility. These appeals include implying that the proposal was the approver's idea, or that it was motivated by the approver's vision, or suggesting that it will help accomplish a political goal of the approver.
Overvaluing contributions to or synergy with other pet projects
This is another form of appeal to personal interest, but it enables the seeker to appeal (unreasonably) to the personal interest of political allies of the approver. Analogous attributes of alternative investments might also be misrepresented negatively.
Competitive champion character assassination
Underestimation and
misrepresentation are
probably the leading
causes of budget
and schedule overruns
When the integrity or performance of the champion of a competitive investment opportunity is suddenly called into question, it's indeed possible that misdeeds are afoot. However, the misdeeds might not be those alleged by the approval seeker; rather, in an ironic twist, they might be the allegations of the approval seeker.
Misrepresenting costs or time required
Underestimation and misrepresentation are probably the leading causes of budget and schedule overruns. Comments about costs and time required for alternative investments might also be misrepresentations. Subject all claims and estimates to close scrutiny.
Misrepresenting risks
Risks of the proposed effort, when misrepresented, are usually underestimated or omitted. But when the proposal includes analysis of alternative investments, risks of those alternatives can be exaggerated.

Sometimes I fear that articles like this serve as handbooks for people with dark motives. But I hope that shining light in dark corners makes the world a brighter place. My hopes conquer my fears. Go to top Top  Next issue: How to Prepare for Difficult Conversations  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenvKvfAYSrGObKkjPjner@ChacsEccUGsYcIqCcCcGoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

Scott McLellan, White House Press Secretary, 2003-2006Devious Political Tactics: Cutouts
Cutouts are people or procedures that enable political operators to communicate in safety. Using cutouts, operators can manipulate their environments while limiting their personal risk. How can you detect cutouts? And what can you do about them?
The Apollo 17 Lunar Rover, showing its damaged fenderAre You a Fender?
Taking political risks is part of the job, especially if you want the challenges and rewards that come with increased responsibility. That's fair. But some people manage political risks by offloading them onto subordinates. Be certain that the risk burden you carry is really your own — and that you carry all of it yourself.
A view of the damage to the Apollo 13 Service ModuleThe Attributes of Political Opportunity: The Finer Points
Opportunities come along even in tough times. But in tough times like these, it's especially important to sniff out true opportunities and avoid high-risk adventures. Here are some of the finer points to assist you in your detective work.
Platform supply vessels battle the fire that was consuming remnants of the Deepwater Horizon oilrig in April 2010Managing Non-Content Risks: II
When we manage risk, we usually focus on those risks most closely associated with the tasks at hand — content risks. But there are other risks, to which we pay less attention. Many of these are outside our awareness. Here's Part II of an exploration of these non-content risks, emphasizing those that relate to organizational politics.
Nez Perce ceremonial shirtExasperation Generators: Irrelevant Detail
When people relate stories at work, what seems important to one person can feel irrelevant to someone else. Being subjected to one irrelevant detail after another can be as exasperating as being told repeatedly to get to the point. How can we find a balance?

See also Workplace Politics and Ethics at Work for more related articles.

Forthcoming issues of Point Lookout

Raquel Welch (left) and Gilda Radner (right) from a @Cite{Saturday Night Live rehearsal, April 24, 1976Coming December 20: Conceptual Mondegreens
When we disagree about abstractions, such as a problem solution, or a competitor's strategy, the cause can often be misunderstanding the abstraction. That misunderstanding can be a conceptual mondegreen. Available here and by RSS on December 20.
An engineer attending a meeting with 14 other engineersAnd on December 27: On Assigning Responsibility for Creating Trouble
When we assign responsibility for troubles that bedevil us, we often make mistakes. We can be misled by language, stereotypes, and the assumptions we make about others. Available here and by RSS on December 27.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenkVTXvpBIhKAYTdqKner@ChacBtAlwNCwMcaPrezaoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Person-to-Person Communications: Models and Applications
When Person-to-Person Communications: Models and Applicationswe talk, listen, send or read emails, read or write memos, or when we leave or listen to voice mail messages, we're communicating person-to-person. And whenever we communicate person-to-person, we risk being misunderstood, offending others, feeling hurt, and being confused. There are so many ways for things to go wrong that we could never learn how to fix all the problems. A more effective approach avoids problems altogether, or at least minimizes their occurrence. In this very interactive program we'll explain — and show you how to use — a model of inter-personal communications that can help you stay out of the ditch. We'll place particular emphasis on a very tricky situation — expressing your personal power. In those moments of intense involvement, when we're most likely to slip, you'll have a new tool to use to keep things constructive. Read more about this program. Here's a date for this program:

Ten Project Management Fallacies: The Power of Avoiding Hazards
Most Ten Project Management Fallaciesof what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.