In Part I of this exploration, we examined three tactics for causing other people to lose control. Skill in recognizing these tactics in the moment is helpful to anyone intent on remaining calm and resisting the urge to attack or to respond to insults in kind. But there are two other consequences of this kind of awareness. First, bystanders who recognize the tactics of manipulation are well equipped to intervene to halt the fracas before it expands. Second, and even more important, a general awareness of widespread ability to recognize these toxic behaviors is a deterrent to anyone considering employing them.
With these advantages in mind, consider four more examples.
- Although interrupting others is widely regarded as rude, the effects of being interrupted vary from person to person. Interruptions can be so upsetting that graceless retaliation is difficult to avoid. And repeated, staccato interruption — badgering — can lead to angry outbursts by the person interrupted.
- When startled, we're more likely to respond gracelessly. To exploit this, an attacker might approach a target stealthily from behind, and suddenly, and apparently affectionately, throw an arm around the target's shoulders. Or the attacker might enter the target's office unannounced at particularly inopportune moments. These methods use invasions of the target's personal space to induce fear responses. Personal space invasions are especially effective if the attacker has physically assaulted or threatened the target — or anyone known to the target — in the past.
- Mock taunting or needling
- To taunt is to provoke or ridicule with hurtful remarks. A mock taunt is a taunt delivered as if in jest, possibly with a wink or smile. Sometimes we call this behavior "needling." Attackers using this tactic expect their targets to be offended because the targets disregard the humorous wrapper. They expect bystanders to be duped by that wrapper. To bystanders, targets who respond gracelessly to the taunt then seem to be thin-skinned. The attacker can then deny intentionally inflicting pain, saying, "I didn't mean anything by it," or, "Can't you take a joke?" or "I didn't realize you were so touchy."
- Ambush, especially in Ambush, especially in public,
depletes the target's ability
to maintain composurepublic, depletes the target's ability to maintain composure by surprising the target in some way that threatens his or her ability to perform. For example, if the target is presenting to a small group virtually, and each remote site was to have received accompanying materials to be distributed in hardcopy, the attacker might deliver to some sites draft versions instead of the final versions, which might appear to be an honest mistake. The confusion can rattle the target, who then might not deal well with the attacker's probing or potentially embarrassing questions during the presentation.
Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenEPYtHblnMoxoqWNbner@ChacILEOidJSoeQzBdfZoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Conflict Management:
- Deniable Intimidation
- Some people achieve or maintain power by intimidating others in deniable ways. Too often, when intimidators
succeed, their success rests in part on our unwillingness to resist, or on our lack of skill. By understanding
their tactics, and by preparing responses, we can deter intimidators.
- Animosity Patterns
- Animosity between two people at work is often attributed to "personality clashes." While sometimes
people can't get along, animosity can also be a tool for accomplishing strictly political ends. Here's
a short catalog of some of its uses.
- Stonewalling: I
- Stonewalling is a tactic of obstruction used by those who wish to stall the forward progress of some
effort. Whether the effort is a rival project, an investigation, or just the work of a colleague, the
stonewaller hopes to gain advantage. What can you do about stonewalling?
- How to Avoid Responsibility
- Taking responsibility and a willingness to be held accountable are the hallmarks of either a rising
star in a high-performance organization, or a naïve fool in a low-performance organization. Either
way, you must know the more popular techniques for avoiding responsibility.
- Stalking the Elephant in the Room: I
- The expression "the elephant in the room" describes the thought that most of us are thinking,
and none of us dare discuss. Usually, we believe that in avoidance lies personal safety. But free-ranging
elephants present intolerable risks to both the organization and its people.
Forthcoming issues of Point Lookout
- Coming May 24: Unresponsive Suppliers: II
- When a project depends on external suppliers for some tasks and materials, supplier performance can affect our ability to meet deadlines. How can communication help us get what we need from unresponsive suppliers? Available here and by RSS on May 24.
- And on May 31: Unresponsive Suppliers: III
- When suppliers have a customer orientation, we can usually depend on them. But government suppliers are a special case. Available here and by RSS on May 31.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenwUMngSnZHBBrphhnner@ChacwanSQoldIIsYfGVJoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- Changing How We Change: The Essence of Agility
- Mastery of the ability to adapt to unpredictable and changing
circumstances is one way of understanding the success of Agile methodologies for product development.
Applying the principles of Change Mastery, we can provide the analogous benefits in a larger arena.
By exploring strategies and tactics for enhancing both the resilience and adaptability of projects and
portfolios, we show why agile methodologies are so powerful, and how to extend them beyond product development
to efforts of all kinds. Read more about this program.
Here's an upcoming date for this program:
- Holiday Inn I-64 West End,
2000 Staples Mill Road, Richmond, VA 23230: May 17,
Monthly Meeting, Central Virginia Chapter of The Project Management Institute. Register now.
- Holiday Inn I-64 West End, 2000 Staples Mill Road, Richmond, VA 23230: May 17, Monthly Meeting, Central Virginia Chapter of The Project Management Institute. Register now.
- Creating High Performance Virtual Teams
- Many people experience virtual teams as awkward, slow, and sometimes
frustrating. Even when most team members hail from the same nation or culture, and even when they all
speak the same language, geographic dispersion or the presence of employees from multiple enterprises
is often enough to exclude all possibility of high performance. The problem is that we lead, manage,
and support virtual teams in ways that are too much like the way we lead, manage, and support co-located
teams. In this program, Rick Brenner shows you how to change your approach to leading, managing, and
supporting virtual teams to achieve high performance using Simons' Four Spans model of high performance.
Read more about this program. Here's an upcoming date
for this program:
- Baci Grill, 134 Berlin
Road, Berlin, CT 06416: September 19,
Monthly Meeting, Southern New England Chapter of the Project Management Institute. Register now.
- Baci Grill, 134 Berlin Road, Berlin, CT 06416: September 19, Monthly Meeting, Southern New England Chapter of the Project Management Institute. Register now.
- The Race to the South Pole: Ten Lessons for Project Managers
- On 14 December 1911, four men led by Roald
Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen
had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished.
As historical drama, why this happened is interesting enough, but to organizational leaders, business
analysts, project sponsors, and project managers, the story is fascinating. Lessons abound. Read
more about this program. Here's an upcoming date for this program:
- CTCPA, 716 Brook Street,
Rocky Hill, CT 06067: September 20,
Full-day Workshop, Southern New England Chapter of the Project Management Institute. Register now.
- CTCPA, 716 Brook Street, Rocky Hill, CT 06067: September 20, Full-day Workshop, Southern New England Chapter of the Project Management Institute. Register now.