Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 16, Issue 5;   February 3, 2016: Patterns of Conflict Escalation: I

Patterns of Conflict Escalation: I

by

Toxic workplace conflicts often begin as simple disagreements. Many then evolve into intensely toxic conflict following recognizable patterns.
Sen. Robert Packwood, Republican of Oregon

Sen. Robert Packwood, Republican of Oregon. He was a Senator from 1969 until he resigned under threat of expulsion in 1995. On the Sunday before Thanksgiving, 1992, shortly after the 1992 election in which Sen. Packwood was re-elected, the Washington Post reported that at least ten women staffers and lobbyists had complained that Senator Packwood had made unwanted, forceful, sexual advances on them, including groping and forceful kissing. The Senator had denied the women's claims, and attempted to erode their credibility. But on November 20, Senator Packwood issued an apology that has become famous as a template for non-apology apologies. It read, in part, "If any of my comments or actions have indeed been unwelcome or if I have conducted myself in any way that has caused any individual discomfort or embarrassment, for that I am sincerely sorry." The "If" in this statement is what makes it a non-apology.

Photo courtesy U.S. Senate.

Conflict resolution skills are universally recognized as valuable assets in modern organizations. And rightly so, because some people know, almost intuitively, exactly how to escalate conflicts from mild disagreements to near-warfare levels, without actually being caught doing it. While these destructive techniques might be of some short-term value to those who employ them, their use threatens the organizational mission.

Early recognition of these destructive patterns can dramatically reduce the incidence of toxic conflict in teams or groups that must frequently collaborate. That's why knowing how to recognize these patterns of conflict escalation is a skill perhaps even more valuable than conflict resolution.

Here is Part I of a little catalog of patterns that people use — sometimes inadvertently — to convert simple disagreements into workplace warfare. This part emphasizes behavior. Part II emphasizes patterns of thinking.

Accusations of marginal norm violations
Behavioral norms, explicit or implicit, govern social behavior in groups. For example, most workplace teams regard raised voices in meetings as violations of behavioral norms. (See "Preventing Toxic Conflict: II," Point Lookout for October 15, 2014, for more on behavioral norms)
Certainly identifying norm violations is necessary at times. But claims not supported by evidence, or claims of marginal violations, can be tools for advancing toxic conflict. Although such assertions can be genuine complaints about the behavior of alleged offenders, they can also be initial aggressive acts, or retaliations for perceived past transgressions. A pattern of claims about marginal transgressions can be a signal worth attending to.
Rejecting apologies
When someone (the Offeror) offers an apology to someone else (the Recipient), and the Recipient declines the offer or refuses to accept the apology, the Recipient deprives the group of an opportunity to put the offense behind it. That might be appropriate, if the apology is insincere or if the offense merits disciplinary action.
But if an apology is a suitable remedy for the offense, declining the apology can actually be an aggressive act intended to escalate the conflict. The rejection might appear innocent, or perhaps petulant, even though it is an act intended to deepen the conflict.
Non-apology apologies
Apologies that aren't Early recognition of patterns of
conflict escalation can dramatically
reduce the incidence of toxic
conflict in teams or groups that
must frequently collaborate
actually apologies have become so common that there is a term for them: non-apology apologies. They can appear in any of various forms. For example, "mistakes were made." Or the very popular "I'm sorry if you were offended (or hurt, or harmed, …)."
Although some people do offer non-apology apologies out of ignorance, it's unsafe to assume that non-apology apologies are always innocent. Because non-apology apologies can sometimes be acts of aggression, probing for truth is wise. To effectively prevent the non-apology apology from escalating the conflict, a third party can try to elicit a sincere apology, which must include a solid element of contrition. To the extent that such attempts do fail, the non-apology apology is more likely to be an aggressive act. For more on effective apologies, see "Demanding Forgiveness," Point Lookout for June 18, 2003.

We'll continue next time with more patterns of conflict escalation.  Next in this series Go to top Top  Next issue: Patterns of Conflict Escalation: II  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenAVhstfOryFExPUonner@ChacaKwuXyarFvylIUBYoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

You worthless piece of trash!Hurtful Clichés: I
Much of our day-to-day conversation consists of harmless clichés: "How goes it?" or "Nice to meet you." Some other clichés aren't harmless, but they're so common that we use them without thinking. Maybe it's time for some thought.
George Washington Crossing the DelawareThe Advantages of Political Attack: II
In workplace politics, attackers are often surprisingly successful with even the flimsiest assertions. Often, they prevail, in part, because they can choose the time and venue for their attacks. They also have the advantage of preparation. How can targets respond effectively?
XP-80 prototype Lulu-Belle on the groundNew Ideas: Generation
When groups work together to solve problems, they employ three processes repeatedly: they generate ideas, they judge those ideas, and they experiment with those ideas. We first examine idea generation.
A flame arrestor of the type that is required on gasoline cans in the United StatesPreventing the Hurt of Hurtful Dismissiveness
When we use the hurtfully dismissive remarks of others to make ourselves feel bad, there are techniques for recovering relatively quickly. But we can also learn to respond to these remarks altogether differently. When we do that, recovery is unnecessary.
Fog offshore near Cabrillo National Monument, CaliforniaClearing Conflict Fog
At times, groups can become so embroiled in destructive conflict that conventional conflict resolution becomes ineffective. How does this happen? What can we do about it?

See also Conflict Management and Emotions at Work for more related articles.

Forthcoming issues of Point Lookout

The end of the line for a railroad trackComing May 30: Chronic Peer Interrupters: I
When making contributions to meeting discussions, we're sometimes interrupted. Often, the interruption is beneficial and saves time. But some people constantly interrupt their peers or near peers, disrespectfully, in a pattern that compromises meeting outcomes. How can we deal with chronic peer interrupters? Available here and by RSS on May 30.
Mohandas K. Ghandi, in the 1930sAnd on June 6: Chronic Peer Interrupters: II
People use a variety of tactics when they're interrupted while making contributions in meetings. Some tactics work well, while others carry risks of their own. Here's Part II of a little survey of those tactics. Available here and by RSS on June 6.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenZEixuvYjXRVEdiPQner@ChachIGrVucLAUXBZuFWoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Technical Debt Management: Making the Business Case
This Technical Debt Management: Making the Business Caseprogram outlines the steps necessary for deploying a program for rational management of technical debt. For many organizations, adopting a program for rationally managing technical debt entails organizational change. And unlike some organizational changes, this one touches almost everyone in the organization, because technical debt isn't merely a technical problem. Technical debt manifests itself in technological assets, to be sure, but its causes are rarely isolated to the behavior and decisions of engineers. We can't resolve the problem of chronically excessive levels of technical debt by changing the behavior of engineers alone. Technical debt is the symptom, not the problem. In this program we outline the essential elements of an effective business case for adopting a rational technical debt management program. But this business case, unlike many business cases, cannot be captured in a document. We must make the case not only at the leadership level of the organization, but also at the level of the individual contributor. Everyone must understand. Everyone must contribute. We explore five issues that make technical debt so difficult to manage, and develop five guidelines for designing technical debt management strategies for the modern enterprise. Read more about this program. Here's a date for this program:

The Race to the South Pole: The Power of Agile Development
On 14The Race to the Pole: An Application of Agile Development December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. Lessons abound. Among the more important lessons are those that demonstrate the power of the agile approach to project management and product development. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.