The rapid-fire attack, often executed before witnesses or within earshot of witnesses, can be unbearable. Defending against it can be even more difficult. But targets who understand the dynamics that make these attacks so hurtful can respond effectively. And that can be very satisfying.
The OODA model of conflict can help us understand the power of the rapid-fire attack. (See "OODA at Work," Point Lookout for April 6, 2011) According to OODA, when we're engaged in conflict, we cycle through a loop of Observing, Orienting, Deciding, and Acting. If the attacks arrive more rapidly than the target can cycle through his or her OODA loop, the attacker can eventually prevail. Unable to keep up with the attacks, some targets feel so overloaded and frustrated that clear thinking itself becomes impossible.
When this happens, how can targets respond? Let's first explore some responses that are usually ineffective.
- File complaints
- Targets can complain to the attacker's supervisor, to their own supervisors, or to the Human Resources department.
- Most likely, if a pattern is in place, a competent supervisor — the target's or the attacker's — would have already noticed the pattern. The supervisor hasn't acted effectively, and probably won't or can't. Still, complaining to supervisors might be worthwhile. It's a matter of judgment.
- Filing complaints with Human Resources might work, especially if the organization has a workplace bullying policy. (See "What Is Workplace Bullying?," Point Lookout for March 3, 2010, for more) But what ensues will be beyond the target's control. For example, the investigation will probably involve interviews of all concerned. If any of those interviewed experience these interviews as attacks instigated by the target, retribution could follow.
- Build alliances
- Sometimes, targets try to assemble alliances of witnesses and other targets, before filing a joint complaint. This approach can work, but there are risks. First, alliance members might not preserve confidentiality. If any of them circulates information about the alliance before the alliance takes action, the attacker can disable the alliance before it can act.
- More important, the person who initiates the alliance might be seen by Management as a "troublemaker." Almost certainly, the attacker will attempt to characterize the alliance initiator as such. If that characterization sticks, the initiator has a new problem, far more serious than the attacker's attacks.
- Wait for the attacks to pass
- Waiting can work, Filing complaints with Human Resources
might work, especially if the
organization has a workplace
bullying policybut targets must maintain an unfailingly cool demeanor, because the attacks will persist, and they might even escalate. As they escalate, they become more obvious to all, and the attacker acquires a well-deserved reputation.
- If the target remains cool, never showing aggression, the attacks will seem to be unprovoked, which could force Management to act. But a single break in discipline by the target can make the attacks seem provoked, reducing the likelihood of Management intervening on behalf of the target.
Are you being targeted by a workplace bully? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just USD 9.99. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenBjThBIaLJUnigsIFner@ChacGBWNqSKlKUKppjKgoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Bullying:
- Responding to Threats: III
- Workplace threats come in a variety of flavors. One class of threats is indirect. Threateners who use
the indirect threats aim to evoke fear of consequences brought about not by the threatener, but by other
parties. Indirect threats are indeed warnings, but not in the way you might think.
- What Is Workplace Bullying?
- We're gradually becoming aware that workplace bullying is a significant deviant pattern in workplace
relationships. To deal effectively with it, we must know how to recognize it. Here's a start.
- Social Isolation and Workplace Bullying
- Social isolation is a tactic widely used by workplace bullies. What is it? How do bullies use it? Why
do bullies use it? What can targets do about it?
- Overtalking: I
- Overtalking is the practice of using one's own talking to prevent others from talking. It can lead to
hurt feelings and toxic conflict. Why does it happen and what can we do about it?
- Seventeen Guidelines About Workplace Bullying
- Bullying is a complex social pattern. Thinking clearly about bullying is difficult in the moment because
our emotions can distract us. Here are some short insights about bullying that are easy to remember
in the moment.
Forthcoming issues of Point Lookout
- Coming March 28: Four Overlooked Email Risks: II
- Email exchanges are notorious for exposing groups to battles that would never occur in face-to-face conversation. But email has other limitations, less-often discussed, that make managing dialog very difficult. Here's Part II of an exploration of some of those risks. Available here and by RSS on March 28.
- And on April 4: Narcissistic Behavior at Work: III
- People who behave narcissistically tend to regard themselves as special. They systematically place their own interests and welfare ahead of anyone or anything else. In this part of the series we consider how this claimed specialness affects the organization and its people. Available here and by RSS on April 4.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbreneCLIPewgoeqauVYTner@ChacIfGtBSBrfhSUUsBwoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.