Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 16, Issue 38;   September 21, 2016: Counterproductive Knowledge Work Behavior

Counterproductive Knowledge Work Behavior

by

With the emergence of knowledge-oriented workplaces, counterproductive work behavior is taking on new forms that are rare or inherently impossible in workplaces where knowledge plays a less central role. Here are some examples.
Police line tape

Police line tape of the type often used at crime scenes. On August 29, 2016, Hengjun Chao, a former researcher at the Mount Sinai Medical School, shot the Dean of the school, Dennis Charney, and another man outside a deli in Chappaqua, New York. Chao was apparently seeking revenge for Charney's having fired him for academic and scientific misconduct in 2009.

Although it is rare for knowledge-based counterproductive workplace behavior to lead to more conventional forms, it does happen. Photo by Tony Webster courtesy Wikimedia.

Employee behavior harmful to the employer's legitimate interests is called Counterproductive Work Behavior (CWB). Gruys and Sackett[Gruys 2003] have developed a typology of CWBs that have since been widely studied and researched. They are property theft or destruction; misuse of information, time, or resources; unsafe behavior; poor attendance; poor quality work; alcohol or drug use at work; and inappropriate verbal or physical action.

While most of these categories apply to knowledge workplaces, knowledge workplaces are sufficiently distinct that they are spawning their own forms of these CWBs. Although they can all be subsumed into the conventional CWB categories, recognizing them as distinctive forms is essential to detection and control. Responsible management of the assets and property of knowledge-oriented organizations therefore requires familiarity with CWBs in forms rarely seen in other workplaces. Here are some CWBs specific to the knowledge-oriented workplace.

Fabricated results
Intentionally producing information assets and presenting them as factual, when they are actually only conjectured or imagined, can be damaging in itself. But when additional developments are built on foundations that include fabrications, the result is an unreliable mixture of fact and fiction.
Organizational perfectionism
Although we usually regard perfectionism as a personal dysfunction, its organizational form can be damaging on a far greater scale. It can consume resources and delay the availability of results that could otherwise have produced significant advancements for both the organization and society at large.
Plagiarism
Plagiarists do expose their employers to significant liability for theft of intellectual property. But perhaps more widespread damage arises when undetected plagiarists are subsequently assessed as more capable and responsible than they actually are. Their peers suffer by comparison, and employers then make erroneous task and responsibility assignments that can lead to organizational catastrophes.
Poorly documented work products
Some knowledge Responsible management of the assets
and property of knowledge-oriented
organizations requires special knowledge
work is valuable only to the extent that its results can be reliably reproduced, maintained, inspected, or extended by people other than its originators. Documentation is thus at least as important as the results themselves. Some knowledge workers distort or withhold documentation as a "job security" strategy. Too often, the strategy is effective.
Specious attacks on the work of colleagues
Toxic forms of workplace politics often include specious attacks on colleagues. However, in the knowledge-based workplace, these attacks can occur in the domain of the organization's knowledge-based work products. Combatants can make specious claims about one another's work, which, if accepted by management, can lead to strategic choices that harm the organization and its customers.
Excessive elaboration
Sometimes we make our problems, and their solutions, more complex than they need to be. By substituting complexity for completeness, we seek to impress others with our prowess. Utility and value rarely follow. See "Abraham, Mark, and Henny," Point Lookout for April 3, 2002, for more.

Although these forms of CWBs are more easily described than controlled, control begins with recognition. Have you seen any of the counterproductive behaviors listed above?  Next in this series Go to top Top  Next issue: Favor Symmetric Virtual Meetings  Next Issue

52 Tips for Leaders of Project-Oriented OrganizationsAre your projects always (or almost always) late and over budget? Are your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around. Read 52 Tips for Leaders of Project-Oriented Organizations, filled with tips and techniques for organizational leaders. Order Now!

For more examples of counterproductive workplace behavior in knowledge-oriented workplaces, see "Counterproductive Knowledge Workplace Behavior: II," Point Lookout for August 9, 2017.

Footnotes

[Gruys 2003]
M. L. Gruys and P. R. Sackett. "Investigating the dimensionality of counterproductive work behavior". International Journal of Selection and Assessment, vol. 11:1, pp. 30-42, 2003 Back

Your comments are welcome

Would you like to see your comments posted here? rbrenfSWBitPquMTZMNDzner@ChacHrWGOAmIfCtXYWCaoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Ethics at Work:

Two infants exchanging secretsYou Have to Promise Not to Tell a Soul
You're at lunch with one of your buddies, who's obviously upset. You ask why. "You have to promise not to tell a soul," is the response. You promise. And there the trouble begins.
A wooden chestYour Wisdom Box
When we make a difficult decision, we sometimes know we've made the wrong choice, even before the consequences become obvious. At other times, we can be absolutely certain that we've done right, even in the face of inadequate information. When we have these feelings, we're in touch with our inner wisdom. It's a powerful resource.
Elevator doors at the Spalding Building, Portland, Oregon (2012)Non-Workplace Politics
When we bring national or local political issues into the workplace — especially the divisive issues — we risk disrupting our relationships, our projects, and the company itself.
The silhouette of a famous fictional detectiveSome Truths About Lies: I
However ethical you might be, you can't control the ethics of others. Can you tell when someone knowingly tries to mislead you? Here's Part I of a catalog of techniques misleaders use.
A field of Cereal RyeApproval Ploys
If you approve or evaluate proposals or requests made by others, you've probably noticed patterns approval seekers use to enhance their success rates. Here are some tactics approval seekers use.

See also Ethics at Work and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

The end of the line for a railroad trackComing May 30: Chronic Peer Interrupters: I
When making contributions to meeting discussions, we're sometimes interrupted. Often, the interruption is beneficial and saves time. But some people constantly interrupt their peers or near peers, disrespectfully, in a pattern that compromises meeting outcomes. How can we deal with chronic peer interrupters? Available here and by RSS on May 30.
Mohandas K. Ghandi, in the 1930sAnd on June 6: Chronic Peer Interrupters: II
People use a variety of tactics when they're interrupted while making contributions in meetings. Some tactics work well, while others carry risks of their own. Here's Part II of a little survey of those tactics. Available here and by RSS on June 6.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenKYTbzqAqKZCAdQqyner@ChacRnFzLfNgHVmiQHnIoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Technical Debt Management: Making the Business Case
This Technical Debt Management: Making the Business Caseprogram outlines the steps necessary for deploying a program for rational management of technical debt. For many organizations, adopting a program for rationally managing technical debt entails organizational change. And unlike some organizational changes, this one touches almost everyone in the organization, because technical debt isn't merely a technical problem. Technical debt manifests itself in technological assets, to be sure, but its causes are rarely isolated to the behavior and decisions of engineers. We can't resolve the problem of chronically excessive levels of technical debt by changing the behavior of engineers alone. Technical debt is the symptom, not the problem. In this program we outline the essential elements of an effective business case for adopting a rational technical debt management program. But this business case, unlike many business cases, cannot be captured in a document. We must make the case not only at the leadership level of the organization, but also at the level of the individual contributor. Everyone must understand. Everyone must contribute. We explore five issues that make technical debt so difficult to manage, and develop five guidelines for designing technical debt management strategies for the modern enterprise. Read more about this program. Here's a date for this program:

The Race to the South Pole: The Power of Agile Development
On 14The Race to the Pole: An Application of Agile Development December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. Lessons abound. Among the more important lessons are those that demonstrate the power of the agile approach to project management and product development. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.