Disclaimer: I am not advocating meeting hijacking. If meetings are orderly, and conducted fairly and with respect for all participants, hijacking is an unethical abuse. It's a means of achieving results disrespectfully and unfairly. Understanding the tactics of meeting hijackers is therefore a sound basis for controlling their behavior and limiting their success. With that goal, I offer this field manual for aspiring hijackers.
- Be stealthy
- Conceal your intentions. Stealth delays the response of anyone intent on keeping the meeting on track.
- Various tactics seem innocent, but actually are helpful to you, the hijacker. For example, if the Chair doesn't create an agenda, or if the agenda is weak, offer to write (or improve) the agenda before the meeting. Or to keep an item off the agenda, in advance of the meeting, propose other items that might pack the agenda, so there won't be time enough to address items you don't favor. Or encourage others to propose additional agenda items. If agenda packing doesn't work, don't oppose addressing the disfavored item. That just alerts people to your objective. Find other ways to freeze out the disfavored item. Pushing it off to the end of the meeting can work, if other items take longer than expected — a condition that you can bring about yourself.
- Be judicious about personal attacks
- It's important to undermine the credibility of any meeting participants who oppose your maneuvers. Because doing so in public is a tad risky, do it privately in advance. Find ways to suggest arguments to others, or to raise questions about the integrity of your opponents, or to subtly encourage others to attack your opponents, either before or during the meeting.
- The credibility-destroying Understanding the tactics of meeting
hijackers is a sound basis for
controlling their behavior
and limiting their successinformation you provide need not actually be true. To protect yourself, you can cite unnamed sources: "I heard that…" or "I saw a report somewhere that…"
- Disrupt the parking lot or not-agenda
- If a topic you want to address has been allocated to the parking lot or not-agenda, raise it anyway, along with a persuasive case for addressing it immediately. This tactic is also helpful for agenda packing to prevent discussion of disfavored items.
- Caution: using this tactic more than once per meeting risks exposing your hijacking attempt for what it is.
- Exploit the power to write history
- Volunteer to be the meeting scribe or secretary. In case all your attempts failed, and the disfavored item was actually addressed, or an item you did favor was not addressed, you can "adjust" the meeting minutes to reflect your favored outcome, whatever that was. You can do this even if you aren't the official scribe, if you distribute your version first.
- As the official scribe, don't be too heavy-handed. The minutes must bear some resemblance to reality, if you ever want another opportunity to use this tactic. Bend the truth — twist it into knots if necessary — but don't break it in any undisputable way.
Do you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenFTuFwaMnWPucGBUUner@ChaceWvImEQAkuxVRGOgoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Effective Meetings:
- FedEx, Flocks, and Frames of Reference
- Your point of view — or reference frame — affects what you see, and how you experience the
world around you. By choosing a reference frame consciously, you can see things differently, and open
a universe of new choices.
- Speak for Influence
- Among the factors that determine the influence of contributions in meetings are the content of the contribution
and how it fits into the conversation. Most of the time, we focus too much on content and not enough on fit.
- When the Chair Is a Bully: II
- Assertiveness by chairs of meetings isn't a problem in itself, but it becomes problematic when the chair's
dominance deprives the meeting of contributions from some of its members. Here's Part II of our exploration
of the problem of bully chairs.
- Twelve Tips for More Masterful Virtual Presentations: I
- Virtual presentations are like face-to-face presentations, in that one (or a few) people present a program
to an audience. But the similarity ends there. In the virtual environment, we have to adapt if we want
to deliver a message effectively. We must learn to be captivating.
- Dealing with Meeting Hijackings
- When you haven't prevented a meeting hijacking, and you believe a hijacking is underway, what can you
do? How can you regain control?
Forthcoming issues of Point Lookout
- Coming October 25: Workplace Memes
- Some patterns of workplace society reduce organizational effectiveness in ways that often escape our notice. Here are five examples. Available here and by RSS on October 25.
- And on November 1: Risk Creep: I
- Risk creep is a term that describes the insidious and unrecognized increase in risk that occurs despite our every effort to mitigate risk or avoid it altogether. What are the dominant sources of risk creep? Available here and by RSS on November 1.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrengJSeHMbBTbDSuitener@ChacFhPWcNaDmKlrPLHIoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- Ten Project Management Fallacies: The Power of Avoiding Hazards
- Most of what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.