Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 8, Issue 28;   July 9, 2008: Approval Ploys

Approval Ploys

by

If you approve or evaluate proposals or requests made by others, you've probably noticed patterns approval seekers use to enhance their success rates. Here are some tactics approval seekers use.

Approval or denial of proposals or requests can have impact beyond the disposition of the issue at hand. It also has political impact. It can make or break a career, render other projects moot, or doom or create whole lines of business. Since so much can be at stake, approval seekers have an incentive to use all manner of techniques to enhance approval rates. Sometimes these techniques become habitual — they use them whether the stakes are high or low.

A field of Cereal Rye

A field of Cereal Rye (Secale cereale). Unlike other domes­ticated crops, such as wheat and barley, cereal rye was not bred from wild stock by intention. When wheat began to be cultivated in Neolithic times, wild rye was a weed. As a weed, it was enough like wheat to grow in wheat fields. Human farmers would pull the weed when they found it, using visual cues to identify the rye. Inevitably, they would miss a few individual plants, especially those that looked most like wheat. Unintentionally, humans were thus providing selective pressure on the rye population, forcing it over tens and hundreds of generations to evolve to look (among several other favored attributes) more and more like wheat. In time, wild rye "learned" to mimic wheat. This form of species mimicry is called Vavilovian mimicry. Crops bred in this manner by humans are called secondary crops. For a comprehensive explanation of mimicry, see Georges Pasteur: A Classification Review of Mimicry Systems in the Annual Review of Ecology and Systematics, Vol. 13, (1982), pp. 169-199.

In effect, the wild rye was using an approval ploy to obtain the same favored treatment that humans were then bestowing on wheat. By including itself among the wheat plants, it was using a technique identified here as "hiding among sheep." In organizations, the authors of investment opportunities try to configure their opportunities to match as closely as possible their understanding of the pattern the approvers are searching for. The task of the approvers, then, is to separate the wheat from the rye — a task that isn't always easy. Over time, in any given organization and for any set of players, the task becomes increasingly difficult. The task is easiest in new or newly reconfigured organizations, because the approvers' patterns are less well understood by approval seekers. Beyond organizations, we find analogous mimicry dynamics in securities markets, retail sales and marketing, mortgage origination, the game of poker, and venture investing, among many other domains. Photo courtesy U.S Department of Agriculture.

Approvers and recommenders would do well to recognize these techniques. When they do, they can be more alert to them, and better maintain objectivity. In a politically healthy culture, recommendations of the sophisticated approver are more likely to be based on the merits; in an unhealthy culture, sophisticated approvers are less likely to commit political blunders.

Here are some of the tactics of approval seekers.

Misrepresenting an approval deadline or the narrowness of a "window of opportunity"
When done to create a sense of urgency, this tactic helps them jump the priority queue. But it's also a way to claim resources before other projects are considered, or to reduce the time available for judicious consideration.
Hiding among sheep
Grouping the request with noncontroversial requests might make it look more innocent or less risky than it actually is.
Using misleading competitive intelligence
Exaggerating the validity or content of competitive intelligence is especially effective when the approver is fearful about the competitive position of the organization.
Appeals to personal interest
Appealing to the approver's personal interest often helps, despite the obvious implications about the approver's corruptibility. These appeals include implying that the proposal was the approver's idea, or that it was motivated by the approver's vision, or suggesting that it will help accomplish a political goal of the approver.
Overvaluing contributions to or synergy with other pet projects
This is another form of appeal to personal interest, but it enables the seeker to appeal (unreasonably) to the personal interest of political allies of the approver. Analogous attributes of alternative investments might also be misrepresented negatively.
Competitive champion character assassination
Underestimation and
misrepresentation are
probably the leading
causes of budget
and schedule overruns
When the integrity or performance of the champion of a competitive investment opportunity is suddenly called into question, it's indeed possible that misdeeds are afoot. However, the misdeeds might not be those alleged by the approval seeker; rather, in an ironic twist, they might be the allegations of the approval seeker.
Misrepresenting costs or time required
Underestimation and misrepresentation are probably the leading causes of budget and schedule overruns. Comments about costs and time required for alternative investments might also be misrepresentations. Subject all claims and estimates to close scrutiny.
Misrepresenting risks
Risks of the proposed effort, when misrepresented, are usually underestimated or omitted. But when the proposal includes analysis of alternative investments, risks of those alternatives can be exaggerated.

Sometimes I fear that articles like this serve as handbooks for people with dark motives. But I hope that shining light in dark corners makes the world a brighter place. My hopes conquer my fears. Go to top Top  Next issue: How to Prepare for Difficult Conversations  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

A lizardfish in a typical poseStonewalling: I
Stonewalling is a tactic of obstruction used by those who wish to stall the forward progress of some effort. Whether the effort is a rival project, an investigation, or just the work of a colleague, the stonewaller hopes to gain advantage. What can you do about stonewalling?
Platform supply vessels battle the fire that was consuming remnants of the Deepwater Horizon oilrig in April 2010Managing Non-Content Risks: II
When we manage risk, we usually focus on those risks most closely associated with the tasks at hand — content risks. But there are other risks, to which we pay less attention. Many of these are outside our awareness. Here's Part II of an exploration of these non-content risks, emphasizing those that relate to organizational politics.
The FBI wanted poster for Evgeniy Mikhailovich Bogachev, a Russian cyber criminalToxic Conflict in Teams: Attacks
In toxic conflict, people try to resolve their differences by eliminating each other's ability to provide opposition. In the early stages of toxic conflict, the attacks often escape notice. Here's a catalog of covert attack tactics.
A distorted view of realityFear/Anxiety Bias: II
When people sense that reporting the true status of the work underway could be career-dangerous, some shade or "spin" their reports. Managers then receive an inaccurate impression of the state of the organization. Here are five of the patterns people use.
A jumbled jigsaw puzzleToxic Disrupters: Responses
Some people tend to disrupt meetings. Their motives vary, but their techniques are predictable. If we've identified someone as using these techniques we have available a set of effective actions that can guide him or her toward a more productive role.

See also Conflict Management and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

A Crusader tank with its 'sunshield' lorry camouflage erected 26 October 1942Coming February 26: Devious Political Tactics: Bad Decisions
When workplace politics influences the exchanges that lead to important organizational decisions, we sometimes make decisions for reasons other than the best interests of the organization. Recognizing these tactics can limit the risk of bad decisions. Available here and by RSS on February 26.
A human shaking hands with an androidAnd on March 5: On Begging the Question
Some of our most expensive wrong decisions have come about because we've tricked ourselves as we debated our options. The tricks sometimes arise from rhetorical fallacies that tangle our thinking. One of the trickiest is called Begging the Question. Available here and by RSS on March 5.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.