Rumors in organizations can be expensive. Because they limit the ability of the organization to unite to achieve shared goals, rumors complicate the task of managing the organization. Unfortunately, much of what we believe about managing rumors predates the arrivals of digital communication and social media. And those outdated beliefs about rumors add to the difficulty of managing cyber rumors in organizations.
For example, consider one phrase we often use in connection with discussions of rumors: word of mouth. When we use a mental model of rumor propagation based on word-of-mouth transmission, we're limiting our considerations to synchronous, face-to-face transmission. That is, we're biasing our thinking by limiting it to actual person-to-person conversation. While that does happen in modern organizations, face-to-face conversation comprises a declining portion of all exchanges between people. And that bias leads to rumor control strategies that are less effective than they might be if they had been developed unencumbered by a bias favoring face-to-face communication.
Rumors tell you either what people hope might be true, or what they fear might be true, or what their biases tell them is true. Rumors are useful if that's what you want to know. But if what you want to know is truth about anything else, rumors can be misleading. They can mislead entire organizations, despite the most energetic attempts by Management to limit the impact of rumors.
This Rumors tell you either what people hope
might be true, or what they fear might be
true, or what their biases tell them is truepost is an attempt to balance the conversation about rumor management by drawing attention to the differences between cyber rumor propagation and pre-cyber rumor propagation. Here are three important differences.
- Cyber rumors have longer lifetimes
- For pre-cyber rumors the transmission medium was voice or print. If by voice, rumors could propagate in person or by telephone. If by print, rumors could propagate in hardcopy by mail or by hand exchange. Both means of transfer, which still operate, have limited lifetimes. The pre-cyber voice channel was clearly time limited. Hardcopy was more durable, but hardcopy could be discarded, mislaid, buried under other hardcopy, or filed. Unless people took intentional steps to preserve or duplicate hardcopy, it was unlikely to propagate far.
- By contrast, cyber-rumors are far more durable. Voice can be recorded. Even video can be recorded. Email or text messages can be duplicated readily. Even if filed, search tools can recover email or text quickly. Widespread access to image search is already available. Access to video and voice search is no doubt just over the horizon.
- Cyber rumors propagate more rapidly
- Pre-cyber rumors that propagated most rapidly probably exploited the telephone. So let's compare rumor propagation speed for the era before the smartphone (pre-Blackberry) to the propagation speed for the smartphone era. The most significant rate limiter for this channel is access to the telephone. In the pre-smartphone era, access to the telephone was limited to the time the user was actually in-office. Given the patterns of meetings and travel, it's fair to assume that many users spent less than 50% of their days in reach of their telephones. This pattern is probably one factor that drove development of answering systems. In the pre-smartphone era, then, a rumor could pass from one person to the next by telephone in one call for only about 50% of the business day. That fraction could increase a bit if the transmitter felt comfortable enough to leave a record of the rumor in voicemail.
- But in the smartphone era, people have access to their phones more than 100% of the business day. Access is greater than 100% because people converse after hours. Moreover, because smartphones also support email, Web, and text channels, smartphones also accelerate rumor propagation velocities for text-based channels. Velocities are now so high that passive rumor monitoring ("I can act to suppress a rumor only if I hear about it somehow") is of little value as a rumor management system component.
- Cyber rumors have higher R0
- Models of disease contagion use a parameter R0 (pronounced R-naught) to represent the number of people to whom an infected person can transmit the disease. Rumors aren't disease, but we can model their spread using similar mathematics. Specifically, in most cases, the R0 of cyber rumors is higher than the R0 of pre-cyber rumors for two reasons.
- First, cyber rumors replicate more readily because they exist in a medium that supports replication. Indeed, the act of transmitting a cyber rumor is almost certainly an act of replication. By contrast, for the case of voice transmission, for example, replication of a pre-cyber rumor requires that one person repeat it aloud to others. Or if the rumor exists in hardcopy, one person must hand it to another, or fire up a photocopier and distribute the copies.
- Second, cyber rumors have longer lifetimes. The transmission process can take place essentially forever, as long as someone can find and read a copy of the rumor. By contrast, per-cyber rumors can propagate only as long as someone is willing to repeat them or distribute them. It is this property of cyber rumors that may be the basis of optimistic projections for future prospects of the online segment of the reputation management industry.
- The result of these seemingly minor differences between cyber rumors and pre-cyber rumors is dramatic. Cyber rumors not only propagate much faster, but their rate of spread is so great that early detection and debunking of cyber rumors must be the focus of any rumor management program. Even more important is information security. Those who are "in the know" about subjects that might be related to possible rumors must take great care not to say or do anything that might be fuel for rumors.
- Cyber rumors propagate more faithfully
- Because cyber rumors replicate by digital means, they're more likely to be faithful copies of what the person passing them along actually received. People do embellish, but in organizations most of the embellishment happens early in the replication chain.
- By contrast, pre-cyber rumors tend to evolve more readily as they propagate, especially if they propagate by voice. The temptation to embellish can be irresistible.
- But even if cyber rumors didn't propagate more faithfully, recipients regard cyber rumors as more credible than pre-cyber rumors. Cyber rumors are more likely to appear in writing — email, text messages, or in Web pages (internal or world-facing). And these media, deservedly or not, are generally more credible than is the person who repeats what he or she heard from another person.
Most important, cyber rumors are better able to reinforce each other. Because people have better access to the full array of extant cyber rumors, they're able to create patterns — commonly called conspiracy theories — that tie the rumors together into a plausible framework that makes the individual component cyber rumors more credible. When this happens, the issue is no longer rumor management. It's damage control. Top Next Issue
Are your projects always (or almost always) late and over budget? Are your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around. Read 52 Tips for Leaders of Project-Oriented Organizations, filled with tips and techniques for organizational leaders. Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Workplace Politics:
- Nasty Questions: II
- In meetings, telemeetings, and email we sometimes ask questions that aren't intended to elicit information.
Rather, they're indirect attacks intended to advance the questioner's political agenda. Here's part
two of a catalog of some favorite tactics.
- Managing Pressure: Communications and Expectations
- Pressed repeatedly for "status" reports, you might guess that they don't want status —
they want progress. Things can get so nutty that responding to the status requests gets in the way of
doing the job. How does this happen and what can you do about it? Here's Part I of a little catalog
of tactics and strategies for dealing with pressure.
- OODA at Work
- OODA is a model of decision making that's especially useful in rapidly evolving environments, such as
combat, marketing, politics, and emergency management. Here's a brief overview.
- You Can't Control What Other People Think
- Ever think that the world would be a much better place if you could control what other people think?
Maybe it would be. And maybe not...
- The Utility Pole Anti-Pattern: II
- Complex organizational processes can delay action. They can set people against one other and prevent
organizations from achieving their objectives. In this Part II of our examination of these complexities,
we look into what keeps processes complicated, and how to deal with them.
See also Workplace Politics and Workplace Politics for more related articles.
Forthcoming issues of Point Lookout
- Coming September 4: Beating the Layoffs: I
- If you work in an organization likely to conduct layoffs soon, keep in mind that exiting voluntarily before the layoffs can carry significant advantages. Here are some that relate to self-esteem, financial anxiety, and future employment. Available here and by RSS on September 4.
- And on September 11: Beating the Layoffs: II
- If you work in an organization likely to conduct layoffs soon, keep in mind that exiting voluntarily can carry advantages. Here are some advantages that relate to collegial relationships, future interviews, health, and severance packages. Available here and by RSS on September 11.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
Recommend this issue to a friend
Send an email message to a friend
rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed