Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 18, Issue 18;   May 2, 2018: Narcissistic Behavior at Work: VII

Narcissistic Behavior at Work: VII

by

Last updated: May 18, 2018

Narcissistic behavior at work prevents trusting relationships from developing. It also disrupts existing relationships, and generates toxic conflict. One class of behaviors that's especially threatening to relationships is disregard for the feelings of others. In this part of our series we examine the effects of that disregard.
A shark of unspecified species

A shark of unspecified species. Most people look upon sharks as fearsome predators, which they are. Someone at work who exhibits narcissistic behaviors might be viewed as a fearsome predator, but that might be a mistake. Typically, they choose their targets because they fear them. They fear the target's ability to attain more powerful status than they can. Usually, fear is the driver — not hatred or animus.

In small organizations, as in small towns, respecting others is essential to social survival. People who are consistently disrespectful of others are soon caught at it, and the rest of the population collaborates to either eject offenders or bring them to heel. Larger organizations are different. In larger organizations, those who disrespect others are able to move from place to place rapidly enough to avoid enforcement action and sometimes, even to avoid recognition of their pattern. Larger organizations can be fertile ground for narcissistic behaviors, especially behaviors that would be recognizable if exhibited repeatedly. In this sense, the organization plays a role in the genesis and incidence of narcissistic behavior.

For example, consider the condescending remark. Condescension is one way to elevate oneself by denigrating others. Used in private, it's nasty enough. But in public, it can be devastating, especially if the target of the condescension feels unable to respond in defense — or counterattack — perhaps because of lesser organizational status than the condescender, or some other constraint.

As a reminder, the behaviors and attitudes typically regarded as narcissistic are these:

Let's now have a closer look at the seventh item above: ruthless disregard for the feelings of others. For convenience in this series, I've been referring to the person exhibiting narcissistic behaviors and attitudes as either Nick or Nora. This time it's Nora.

Illustrations
Narcissistic behavior in children seems to adults to be harmless, though children do experience it more intensely. That might be why it provides such a useful template for understanding the adult pattern. Name-calling is one of its simpler forms, but it also includes bullying and cyber-bullying, deprecatory nicknames, condescending or patronizing remarks, insults, rumormongering, isolation tactics — anything that might make the target feel bad or defensive.
Whether in Whether in adults or children,
the offender's objective is
inflicting pain on the target,
as publicly as possible
adults or children, the offender's objective is inflicting pain on the target, as publicly as possible.
Description
Although I (following many others) have described this behavior as disregard for the feelings of others, it's possible that disregard isn't quite the right term. To disregard would be to ignore. What actually happens is more like directed effort to eliminate a perceived threat, which requires focused attention, rather than inattention or ignoring. People who exhibit this behavior do so with consistency and passion to attain and then maintain the view of themselves that they seek.
For example, suppose Nora encounters a confident and popular individual I'll call Cora. Assessing Cora's social status, Nora perceives Cora as a threat, most intensely if Cora challenges Nora or even if she simply declines to subordinate herself to Nora. To neutralize the threat, Nora begins with indirect or subtly dismissive tactics, but she'll escalate to whatever level is necessary to defuse the threat she perceives from Cora.
Nora's targets sometimes regard these attacks as personal, in the sense that they believe that Nora might harbor some ill will toward them. That might be true in some cases, but the primary motivator for Nora's attacks is not animus; rather, it is the need to assuage her own concerns about the threats she believes these targets might represent.
Organizational risks
Nora's behavior has undesirable effects, both direct and indirect. Among the direct effects, her treatment of Cora (or anyone she perceives as a threat) creates or contributes to a toxic atmosphere. Teamwork and cooperation suffer. Among indirect effects, her treatment of Cora intimidates others, who then avoid Nora, or limit their interactions with her. They might even limit their contributions to avoid conflict with Nora. This withholding behavior deprives the organization of information and contributions that might at times be important. It can be just as destructive as any of the more common forms of holding back.
Coping tactics
As Nora's supervisor, recognize that her behavior could increase turnover among your more capable subordinates. Tolerating it is therefore risky. Because intervening to alter her behavior is unlikely to succeed, the most effective alternatives are termination, transfer, or isolation. Terminating Nora or transferring her must be done with care and advice from Human Resources representatives. Isolation might be more practical, because it need not be total. It's sufficient to isolate her from anyone she regards as a threat.
As Nora's co-worker, your chances of being targeted are correlated with Nora's perception of your social status. In time, she'll either move on to another position voluntarily, or management will reassign or terminate her. But that time might not arrive soon. In the meantime, you must choose to either assume a less visible, less respected role, or accept her attacks, or counterattack so effectively that she will voluntarily exit. If she is especially adept, the choice to become less visible might be the wisest.

Next time, we'll examine Nick's envy of others or his belief that he is the envy of others. First in this series  Next in this series Go to top Top  Next issue: Unethical Coordination  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenOTCnTxRisWUTkHfzner@ChacKPHLaZQfiOKguedOoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

Patterns of ConversationPatterns of Everyday Conversation
Many conversations follow identifiable patterns. Recognizing those patterns, and preparing yourself to deal with them, can keep you out of trouble and make you more effective and influential.
Former U.S. Secretary of State Colin PowellDevious Political Tactics: A Field Manual
Some practitioners of workplace politics use an assortment of devious tactics to accomplish their ends. Since most of us operate in a fairly straightforward manner, the devious among us gain unfair advantage. Here are some of their techniques, and some suggestions for effective responses.
The Panzerkampfwagen VIII Maus, a German World War II super-heavy tankWhy There Are Pet Projects
Pet projects are common in organizations, including organizations with healthy and mature planning processes. They usually consume resources at levels beyond what the organization intends, which raises the question of their genesis: Where do pet projects come from?
The breech plug of one of the nine 16-inch guns of the U.S.S. MissouriMore Limitations of the Eisenhower Matrix
The Eisenhower Matrix is useful for distinguishing which tasks deserve attention and in what order. It helps us by removing perceptual distortion about what matters most. But it can't help as much with some kinds of perceptual distortion.
A meeting of people and their laptopsExploiting Functional Fixedness
Functional fixedness is a cognitive bias that creates difficulty in seeing novel uses of things that have familiar uses. Some devious moves in workplace politics exploit functional fixedness.

See also Workplace Politics and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

The end of the line for a railroad trackComing May 30: Chronic Peer Interrupters: I
When making contributions to meeting discussions, we're sometimes interrupted. Often, the interruption is beneficial and saves time. But some people constantly interrupt their peers or near peers, disrespectfully, in a pattern that compromises meeting outcomes. How can we deal with chronic peer interrupters? Available here and by RSS on May 30.
Mohandas K. Ghandi, in the 1930sAnd on June 6: Chronic Peer Interrupters: II
People use a variety of tactics when they're interrupted while making contributions in meetings. Some tactics work well, while others carry risks of their own. Here's Part II of a little survey of those tactics. Available here and by RSS on June 6.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenzACgNHzjfkQeLjlXner@ChacKQhnzHkeeVtMjpjUoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Technical Debt Management: Making the Business Case
This Technical Debt Management: Making the Business Caseprogram outlines the steps necessary for deploying a program for rational management of technical debt. For many organizations, adopting a program for rationally managing technical debt entails organizational change. And unlike some organizational changes, this one touches almost everyone in the organization, because technical debt isn't merely a technical problem. Technical debt manifests itself in technological assets, to be sure, but its causes are rarely isolated to the behavior and decisions of engineers. We can't resolve the problem of chronically excessive levels of technical debt by changing the behavior of engineers alone. Technical debt is the symptom, not the problem. In this program we outline the essential elements of an effective business case for adopting a rational technical debt management program. But this business case, unlike many business cases, cannot be captured in a document. We must make the case not only at the leadership level of the organization, but also at the level of the individual contributor. Everyone must understand. Everyone must contribute. We explore five issues that make technical debt so difficult to manage, and develop five guidelines for designing technical debt management strategies for the modern enterprise. Read more about this program. Here's a date for this program:

The Race to the South Pole: The Power of Agile Development
On 14The Race to the Pole: An Application of Agile Development December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. Lessons abound. Among the more important lessons are those that demonstrate the power of the agile approach to project management and product development. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.