At work, political attackers seem to some to be amoral, without conscience, or just plain slime. Doubtless, some are, but most are hard working people dedicated to purposes they consider worthwhile. What distinguishes them is that they see their attacks as justifiable, even necessary, parts of their workplace roles.
Some attacks are indeed vile and serve little purpose. Among these are attacks aimed at the target's essence or legitimacy. For organizational targets, they raise questions about their continued independent existence; for people, they emphasize the target's character.
Enduring a political attack on one's essence is emotionally painful. It's unnerving, and some targets have difficulty maintaining the coolness needed for formulating effective responses. To learn how to reason under such pressure, it helps to appreciate the psychological advantages attackers enjoy.
- Deal with your inhibitions about attacking
- Although most of us are reluctant to initiate attack, we find it somewhat easier to respond to it. Initiation often creates feelings of guilt. Since the key to prevailing in a political conflict is capturing the initiative by counterattacking, targets probably cannot recover unless they can overcome their inhibitions. Since attackers have already dealt with their inhibitions, they can usually maintain dominance until the target's soul-searching is completed.
- Prepare in advance. If you anticipate attack, recognize that survival depends on your willingness to counterattack. Deal with your inhibitions by accepting that they apply only in times of relative peace. And remember that initiating attacks can be justified when your target's behavior is harmful to the organization.
- Rewrite your unwritten rules
- Most believe that political conflict has at least some rules. For instance, most agree that damaging a rival's computer is foul play. But at the margins, there's little agreement about what's fair or ethical. The advantage goes to the flexible.
- Your Although most of us
are reluctant to initiate
attack, we find it
to respond to itown rules are your own. They're probably not shared by your attacker. Even though your attacker has been unwilling to engage in some kinds of conduct, those inhibitions might fall at any time. The more effective your response, the more likely is your attacker to overcome those inhibitions. Your political survival might require expanding your own boundaries more rapidly than your attacker does. Find ways to expand your boundaries with integrity.
- Use diversions and distractions
- Diversions and distractions are methods for controlling the target. Diversions absorb the capacity of the target to counterattack. Distractions absorb the capacity of the target to understand the environment.
- Observe the political attackers in your organization. Notice their use of diversion and distraction. Determine their set routines; watch for improvisations. Anticipating what might be effective against you helps you design countermeasures. Learn techniques that help you when you attack.
These are difficult transitions for anyone to make, especially under the pressure of political attack. If attack abounds where you work, start making your transitions now. First in this series Top Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrenQcgTKhOGZiozkgVJner@ChacPLPFAGBztVobThRWoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Politics:
- There Are No Micromanagers
- If you're a manager who micromanages, you're probably trying as best you can to help your organization
meet its responsibilities. Still, you might feel that people are unhappy — that whatever you're
doing isn't working. There is another way.
- Responding to Threats: I
- Threats are one form of communication common to many organizational cultures, especially as pressure
mounts. Understanding the varieties of threats can be helpful in determining a response that fits for you.
- The Advantages of Political Attack: II
- In workplace politics, attackers are often surprisingly successful with even the flimsiest assertions.
Often, they prevail, in part, because they can choose the time and venue for their attacks. They also
have the advantage of preparation. How can targets respond effectively?
- The Attributes of Political Opportunity: The Basics
- Opportunities come along even in tough times. But in tough times, it's especially important to distinguish
between true opportunities and high-risk adventures. Here are some of the attributes of desirable political
- Devious Political Tactics: Mis- and Disinformation
- Practitioners of workplace politics intent on gaining unfair advantage sometimes use misinformation,
disinformation, and other information-related tactics. Here's a short catalog of techniques to watch for.
Forthcoming issues of Point Lookout
- Coming May 2: Narcissistic Behavior at Work: VII
- Narcissistic behavior at work prevents trusting relationships from developing. It also disrupts existing relationships, and generates toxic conflict. One class of behaviors that's especially threatening to relationships is disregard for the feelings of others. In this part of our series we examine the effects of that disregard. Available here and by RSS on May 2.
- And on May 9: Unethical Coordination
- When an internal department or an external source is charged with managing information about a large project, a conflict of interest can develop. That conflict presents opportunities for unethical behavior. What is the nature of that conflict, and what ethical breaches can occur? Available here and by RSS on May 9.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenzaOPdbiQOrYAuWzbner@ChacjkQMbmhfgTwzFrwboCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.