It isn't surprising when some pet projects get resources — perhaps their nurturers answer to no one, or they abuse their authority. But some pet projects thrive even when their nurturers lack absolute power and seem to have done nothing wrong. Somehow they've found ways to feed their pets without violating organizational policy — or, at least, not much.
In last week's edition, we examined how nurturers of pet projects can abuse their authority to secure resources. Here are some methods that don't necessarily involve abuse of authority, but do depend on cleverness.
- Legitimate circumvention of policy intent
- Sometimes resources flow to pet projects by secretive redirection. In some cases this involves falsification of records, but sometimes the projects' nurturers have exploited flexibility or openings in organizational policy.
- Since even the most primitive control systems involve several people, this technique usually requires collaboration among several individuals, which is difficult to arrange unless the activity is at least superficially legitimate. It's wise to regard these incidents as indicators of (possibly benign) policy defects.
- Exchange of political favors
- In an I-scratch-your-back-you-scratch-mine exchange, two people with access to resources trade those resources, nurturing each other's pets. On the surface, each resource-owner's contribution is legitimate.
- Detecting this tactic is complicated when the exchange crosses supervisory boundaries, because it requires visibility at organizational levels higher than the supervisor of each party to the exchange. It's wise to regard these incidents as indicators of defects in compliance monitoring.
- Scavenging, surplus and mistakes
- Occasionally, possibly as a result of accounting errors, surplus or idle resources become available to anyone who wants them. For instance, some engineering consulting firms have internal R&D programs intended for development of expertise, but these programs can sometimes be deflected to pet projects.
- In many Surplus or idle resources
sometimes become available
to anyone who wants theminstances, the losses to the organization resulting from deflecting these resources are acceptable. Detecting the deflection might not result in much advantage to the organization. But when internal development programs are a means of implementing important strategic decisions, monitoring the use of their resources to inhibit redirection to pet projects can add significant value to the program.
- Gifts from above
- At times — usually at the nurturer's request — the nurturer's supervisor might bestow a gift of resources on the pet project, knowing that the organization would not support the project to that extent through routine channels.
- Motivations for such gifts can include a desire to assist the career of the subordinate, and a desire to see the pet project progress. Preventing these gifts might not be advisable, because prevention could conflict with the supervisor's appropriate independence.
By whatever means nurturers secure resources for their pets, they do so in contravention of organizational intent. Fortunately, pet projects do sometimes benefit the organization, and perhaps that's one reason why they're here to stay. First in this series Top Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrenYcojcwCVCNnnSngkner@ChacclbEVCOkFRaTDgDGoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Politics:
- How to Tell If You Work for a Nanomanager
- By now, we've all heard of micromanagers, and some have experienced micromanagement firsthand. Some
of us have even micromanaged others. But there's a breed of micromanagers whose behavior is so outlandish
that they need a category of their own.
- The Deck Chairs of the Titanic: Obvious Waste
- Among the most futile and irrelevant actions ever taken in crisis is rearranging the deck chairs of
the Titanic, which, of course, never actually happened. But in the workplace, we engage in activities
just as futile and irrelevant, often outside our awareness. Recognition is the first step to prevention.
- How to Stop Being Overworked: I
- If you feel overworked, you probably are. Here are some tactics for those who want to bring an end to
it, or at least, lighten the load.
- Conversation Despots
- Some people insist that conversations reach their personally favored conclusions, no matter what others
want. Here are some of their tactics.
- Cultural Indicators of Political Risk
- Because of fire risk, hiking in dry forests during dry seasons can be dangerous. In the forest, we stay
safe from fire if we attend to the indicators of fire risk. In the workplace, do you know the indicators
of political risk?
Forthcoming issues of Point Lookout
- Coming March 28: Four Overlooked Email Risks: II
- Email exchanges are notorious for exposing groups to battles that would never occur in face-to-face conversation. But email has other limitations, less-often discussed, that make managing dialog very difficult. Here's Part II of an exploration of some of those risks. Available here and by RSS on March 28.
- And on April 4: Narcissistic Behavior at Work: III
- People who behave narcissistically tend to regard themselves as special. They systematically place their own interests and welfare ahead of anyone or anything else. In this part of the series we consider how this claimed specialness affects the organization and its people. Available here and by RSS on April 4.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenTdiCUcVKiEhbfBAPner@ChacyXAaRObFUtoTfGVUoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.