Although Agenda Despots seek complete control of their meetings' agendas, many organizational cultures value openness and collaborative approaches to meeting management. Many Agenda Despots must therefore feign openness to topics contributed by attendees. Here are seven methods for controlling the agenda without seeming to do so.
- Abuse the not-agenda
- A not-agenda is a list of topics that won't be addressed at the meeting. (See "First Aid for Painful Meetings," Point Lookout for October 24, 2001) Although most meetings don't specify not-agendas, not-agendas can be abused. One method is publishing the not-agenda before soliciting contributions for the agenda, thereby fending off contributions before they're offered.
- Freeze the agenda
- In this approach, Agenda Despots announce a freeze date after which topic contributions can't be considered. By setting this date early enough, or setting it to precede a significant scheduled news-generating event, the Agenda Despot can exclude disfavored topics that depend on late-breaking news.
- Don't solicit agenda contributions
- Some attendees need a little nudge before they dare contribute agenda topics. Some need reminders. By failing to provide nudges or reminders, Agenda Despots attenuate the contributed topic stream, and might even prevent disfavored contributions.
- Abuse the parking lot
- The "parking lot" is a list of topics and issues that arise during the meeting, and which aren't on the agenda. (See "Using the Parking Lot," Point Lookout for September 12, 2007) Parking lot abuse is the systematic ignoring of parked items. They're never addressed. In this way, Agenda Despots can continue to ignore topics that attendees might have contributed for the agenda in advance, and which the Agenda Despot nevertheless excluded from the agenda. If the contributors then raise their excluded topics during the meeting, the Agenda Despot parks them.
- Falsely promise inclusion
- When contributions do arrive, and one of them is unwelcome, the Agenda Despot can claim, "That topic would fit nicely in <name-of-already-included-topic>," which can mollify the contributor. At the meeting, the contributed topic is treated only cursorily, if at all.
- Reject contributions
- Rejecting contributions is always possible,Many of these techniques
are active deceptions but doing so can degrade the Agenda Despot's credibility, especially if he or she has solicited contributions. At times, the price might be worth paying, if the suggested topic is troublesome, and if the Agenda Despot has little credibility left to lose.
- Schedule disfavored topics for the end
- When Agenda Despots can't exclude from the agenda a suggested but disfavored topic, they can include it in the agenda, but schedule it near the end of the meeting. When earlier topics overrun their allotted times (if time allotments are published at all), the Agenda Despot, with great (but feigned) regret, can announce that "Regrettably, we must postpone this topic to a later date."
Many of these techniques are active deceptions, because they present the Agenda Despots as being open to contributions when in fact they are not. Using the concept of active deception, see how many additional techniques you can devise. First in this series Top Next Issue
Do you spend
your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenwkxzzJzzKTpKVZtpner@ChacvWtBXbRnHDHKFaBtoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Effective Meetings:
- What Haven't I Told You?
- When a project team hits a speed bump, it often learns that it had all the information it needed to
avoid the problem, sometimes months in advance of uncovering it. Here's a technique for discovering
this kind of knowledge more systematically.
- Asking Brilliant Questions
- Your team is fortunate if you have even one teammate who regularly asks the questions that immediately
halt discussions and save months of wasted effort. But even if you don't have someone like that, everyone
can learn how to generate brilliant questions more often. Here's how.
- Remote Facilitation in Synchronous Contexts: I
- Whoever facilitates your distributed meetings — whether a dedicated facilitator or the meeting
chair — will discover quickly that remote facilitation presents special problems. Here's a little
catalog of those problems, and some suggestions for addressing them.
- The Fallacy of Composition
- Rhetorical fallacies are errors of reasoning that introduce flaws in the logic of arguments. Used either
intentionally or by accident, they often lead us to mistaken conclusions. The Fallacy of Composition
is one of the more subtle fallacies, which makes it especially dangerous.
- Untangling Tangled Threads
- In energetic discussions, topics and subtopics get intertwined. The tangles can be frustrating. Here's
a collection of techniques for minimizing tangles in complex discussions.
Forthcoming issues of Point Lookout
- Coming April 25: Narcissistic Behavior at Work: VI
- Narcissistic behavior at work distorts decisions, disrupts relationships, and generates toxic conflict. These consequences limit the ability of the organization to achieve its goals. In this part of our series we examine the effects of exploiting others for personal ends. Available here and by RSS on April 25.
- And on May 2: Narcissistic Behavior at Work: VII
- Narcissistic behavior at work prevents trusting relationships from developing. It also disrupts existing relationships, and generates toxic conflict. One class of behaviors that's especially threatening to relationships is disregard for the feelings of others. In this part of our series we examine the effects of that disregard. Available here and by RSS on May 2.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendvavMJWgaPedcuIsner@ChacxnCXfeaoEpalBXtVoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.