In the first part of this series about long-loop conversations in the context of virtual teams, we explored asking questions that can reduce the number of exchanges required to get definitive responses. In this part, we examine ways to clear the fog — the confusions, blind spots and omissions that impede our way to clarity.
Understanding how fog forms and persists in the long-loop environment is helpful in itself. Here are three practices that tend to create or preserve fog.
- Fear of offending others
- Sometimes people withhold questions because they fear that asking them could offend others. Askers fear that their questions might seem too fundamental or too obvious. Sometimes they've asked the question before, but they weren't satisfied with the response; sometimes the asking led to tension.
- Fear of self-disclosure
- At times, we withhold comments or questions that could be helpful to the collaboration, but which also risk disclosing our own ignorance, shortcomings, or past errors. Unless the other collaborators raise the topic, this withholding can bar the group from exploring the issue.
- Defenses and defensive attacks
- When we bristle in response to others' comments, we signal that the conversation has crossed into unacceptability. If the topic is relevant to the collaboration, defensiveness and defensive attacks can prevent the collaborators from investigating relevant and important territory.
Here are four questions we can use to clear the fog, even if we're unaware of its existence.
- What should I be asking you that I haven't asked yet?
- The answer to this question might expose the obvious: questions you never thought to ask. But if the responder tells you that you haven't asked a question, and you feel that you have, this exchange might expose questions asked ineffectively, or the asker's misunderstanding or ignoring of a question you did ask.
- Do you think I might be confused about anything? If so, what?
- This question gives the responder permission to suggest that the asker might be confused. The responder might not accept the offer, but making the offer enhances the chance that the responder might surface new information.
- What questions haven't you asked yet?
- Responders usually Sometimes people withhold
questions because they fear
that asking them could
offend othersknow that they can ask questions. But this question invites responders to focus on questions they've withheld. Those questions are often the most productive.
- Are there any risks we haven't considered?
- Risks that haven't been mentioned can be especially fruitful, because they often include the so-called "elephants in the room." This question gives people license to discuss those elephants.
These questions help even when you don't know you need help. They work by encouraging participants to seek unpleasant information, or to reveal information they might be withholding. But they depend for their effectiveness on a commitment by the asker not to be offended, and a commitment by the responder to be honest and forthright. Have I left anything out? First in this series Next in this series Top Next Issue
Is your organization a participant in one or more global teams? Are you the owner/sponsor of a global team? Are you managing a global team? Is everything going well, or at least as well as any project goes? Probably not. Many of the troubles people encounter are traceable to the obstacles global teams face when building working professional relationships from afar. Read 303 Tips for Virtual and Global Teams to learn how to make your global and distributed teams sing. Order Now!
For more suggestions for the long-loop environment, "Long-Loop Conversations: Clearing the Fog," Point Lookout for June 24, 2009; and "Long-Loop Conversations: Anticipation," Point Lookout for August 12, 2009.
Your comments are welcomeWould you like to see your comments posted here? rbrenLaeumfQoXTmSvgPdner@ChacnlWnsZsXJYQeZyCSoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Effective Communication at Work:
- Why Dogs Wag Their Tails
- If you've ever known a particular dog at all well, you've probably been amazed at how easy it is to
guess a dog's mood, even though dogs can't speak. Perhaps what's more amazing is that it's so difficult
to guess a person's mood, even though humans can speak.
- Masked Messages
- Sometimes what we say to each other isn't what we really mean. We mask the messages, or we form them
into what are usually positive structures, to make them appear to be something less malicious than they
are. Here are some examples of masked messages.
- The Ups and Downs of American Handshakes: I
- In much of the world, the handshake is a customary business greeting. It seems so simple, but its nuances
can send signals we don't intend. Here are some of the details of handshakes in the USA.
- The Ups and Downs of American Handshakes: II
- Where the handshake is a customary business greeting, it's possible to offend accidentally. Here's Part
II of a set of guidelines for handshakes in the USA.
- The Limits of Status Reports: II
- We aren't completely free to specify the content or frequency of status reports from the people who
write them. There are limits on both. Here's Part II of an exploration of those limits.
Forthcoming issues of Point Lookout
- Coming May 2: Narcissistic Behavior at Work: VII
- Narcissistic behavior at work prevents trusting relationships from developing. It also disrupts existing relationships, and generates toxic conflict. One class of behaviors that's especially threatening to relationships is disregard for the feelings of others. In this part of our series we examine the effects of that disregard. Available here and by RSS on May 2.
- And on May 9: Unethical Coordination
- When an internal department or an external source is charged with managing information about a large project, a conflict of interest can develop. That conflict presents opportunities for unethical behavior. What is the nature of that conflict, and what ethical breaches can occur? Available here and by RSS on May 9.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrengJFfxjdWICRqrYBiner@ChacuBbESpxrvXaYZqcooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.