Meeting hijacking is widely defined as the result of the behavior of an individual who insists that the meeting participants discuss his or her preferred topic, instead of whatever is currently on the agenda. Although that situation could be a hijacking, the problem is both subtler and more complex.
For our purposes, we define a meeting hijacking as any attempt, in defiance of group norms, to take the meeting in a direction other than that determined by agreed-upon processes.
In the next issue, we'll catalog techniques hijackers use to hijack meetings. For now, let's explore why people try to hijack meetings.
In what follows, I'll use the names Horace or Harriet to refer to the attempted hijacker, in place of the awkward form "he or she."
- Control
- Some people hijack meetings to gain control of the group. They care less about content than they do about controlling the process. For example, they might want to undermine the chair's authority, hoping to demonstrate the chair's unsuitability for the role. Or they might be acting on behalf of powerful people, who might not even be present, if those people want the group to fail in its mission, for political reasons. Motivations abound.
- Those who seek control of the meeting are not always "control addicts." Sometimes people seek control quite rationally, if for nefarious purposes.
- Urgent sincerity
- When Horace The choice of response to hijack
attempts depends to some extent
on the motives of the hijackersurgently and sincerely believes that an issue must be addressed immediately, and when private attempts to convince the chair have failed to do so, he might attempt a hijacking. In one variety of urgent sincerity, Horace is laboring under a misapprehension of the actual issues facing the meeting. He might be either confused or misled by others. One can, after all, be sincerely mistaken. - Horace can accept that the matter won't be addressed, or alternatively, he can try to persuade the other participants during the meeting. The latter alternative fits most definitions of hijacking. Appropriate responses to such actions differ markedly from responses to the more nefarious control-motivated tactics.
- Conspiracies
- Harriet might not actually care much about the agenda she's disrupting, but she does disrupt it because of an agreement she made with someone who does care. Typically this happens when Harriet's co-conspirator, Horace, cannot hijack the meeting himself. He might have acquired a reputation that has put the meeting chair on guard, or he might not be present. He might have an obvious conflict of interest that would undermine his direct attempts to hijack the meeting, whereas Harriet's attempts might be more likely to appear to be sincere.
- Most conspiracies are easily detected, but they often escape consideration as possible explanations for hijacking behavior because the idea seems so elaborate. Some feel reluctant to share the thought of conspiracy with others for fear of seeming "paranoid," to use the term in the lay sense. Conspiracies are most effective when they target people who can't accept their existence.
Motivations for hijack attempts vary widely. Your choice of response depends on what you think is actually happening. We'll examine hijacking techniques next time, and prevention in the issue after that. Next issue in this series Top Next Issue
Do you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Effective Meetings:
- Think Before You PowerPoint
- Microsoft PowerPoint is a useful tool. Many of us use it daily to create presentations that guide meetings
or focus discussions. Like all tools, it can be abused — it can be a substitute for constructive
dialog, and even for thought. What can we do about PowerPoint abuse?
- Effects of Shared Information Bias: I
- Shared information bias is the tendency for group discussions to emphasize what everyone already knows.
It's widely believed to lead to bad decisions. But it can do much more damage than that.
- Reaching Agreements in Technological Contexts
- Reaching consensus in technological contexts presents special challenges. Problems can arise from interactions
between the technological elements of the issue at hand, and the social dynamics of the group addressing
that issue. Here are three examples.
- Would Anyone Object?
- When groups consider whether to adopt proposals, some elect to poll everyone with a question of the
form, "Would anyone object if X?" It's a risky approach, because it can lead to damaging decisions
that open discussion in meetings can avoid.
- Exploitation and Conversational Narcissism at Work: II
- Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize
the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are
six examples that emphasize exploitation of others.
See also Effective Meetings and Effective Meetings for more related articles.
Forthcoming issues of Point Lookout
- Coming January 22: Storming: Obstacle or Pathway?
- The Storming stage of Tuckman's model of small group development is widely misunderstood. Fighting the storms, denying they exist, or bypassing them doesn't work. Letting them blow themselves out in a somewhat-controlled manner is the path to Norming and Performing. Available here and by RSS on January 22.
- And on January 29: A Framework for Safe Storming
- The Storming stage of Tuckman's development sequence for small groups is when the group explores its frustrations and degrees of disagreement about both structure and task. Only by understanding these misalignments is reaching alignment possible. Here is a framework for this exploration. Available here and by RSS on January 29.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
Recommend this issue to a friend
Send an email message to a friend
rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.
- Wikipedia has a nice article with a list of additional resources
- Some public libraries offer collections. Here's an example from Saskatoon.
- Check my own links collection
- LinkedIn's Office Politics discussion group