Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 22, Issue 28;   July 20, 2022: Overt Verbal Abuse at Work

Overt Verbal Abuse at Work

by

Verbal abuse in the workplace involves using written or spoken language to disparage, to disadvantage, or to otherwise harm others. Perpetrators tend to favor tactics that they can subsequently deny having used to harm anyone.
A mallet. The same object can be either a tool or a weapon

A mallet. The same object can be either a tool or a weapon. So it is with words. Words can be the means by which we exchange important information and ideas. Or they can be the weapons with which we inflict harm on each other.

Although abuse at work takes many forms, targets seeking to minimize the harmful effects of abuse would do well to study verbal abuse. Verbal abuse is the most common form of abuse at work for three reasons. First, anyone can engage in verbal abuse, because it doesn't require access to organizational resources. Second, we are (nearly) all experienced in abusing others verbally, because we learn to do it as children. And finally, when emotions take over, abusing others verbally is the one tactic that requires neither planning nor tools.

Plausible deniability

Effective responses to verbal abuse must necessarily begin with identification. Obviously, you can't respond effectively to an abusive act if you don't recognize it as abusive. That's one reason why covert verbal abuse tactics are so appealing to sophisticated perpetrators. But sophisticated perpetrators employ covert verbal abuse tactics for an even more important reason. They want to be able to plausibly deny having engaged in verbal abuse. Examples of plausible denials:

  • "Don't be so sensitive. I didn't mean anything by it."
  • "I was only yanking your chain. You have to learn to have a little more fun."
  • "It's just the way he is. Don't take him so seriously."

Overt techniques of verbal abuse

I have Words can be the means by which we
exchange important information and
ideas. Or they can be the weapons
we use to harm each other.
no examples of plausibly deniable verbal abuse because words don't appear to be abusive unless you know the context in which they are used. And typically, only the target has enough context to recognize the abuse as such.

But we can categorize the methods perpetrators use. Covert techniques of verbal abuse are those that are so subtle that they escape notice. I'll treat those in a future post. In this post, I provide examples of overt verbal abuse — tactics that are visible to anyone witnessing the exchange.

Mispronuncing, misnaming, and misstating
Intentionally mispronouncing the target's personal name can be a form of denying acknowledgement of the target's validity as a human being. Repeating this error, especially before an audience, enhances the effectiveness of this tactic. In written communication, this tactic takes the form of misspelling or misnaming. Referring to Ellison as Allison, or to Bart as Bert, are examples.
But personal names are only one form of this technique. The perpetrator can apply this tactic when referring to projects, techniques, procedures, vendors, or initiatives — anything known to be favored by the target. The effect is similar: it communicates disdain for the item mis-referenced. The perpetrator thereby denies its very existence, indirectly abusing the target.
Threatening
Threats are explicit statements of intent to cause harm. These acts are perhaps the most obvious examples of verbal abuse. They usually consist of a condition and a consequence that the target regards as physically, professionally, or psychologically harmful. Example: "If you do X, I'll do Y." Either the condition or the consequence (or both) can occur in a negative form, as in, "If you don't do X, I'll do Y," or "If you do X, I won't do Y," or "If you don't do X, I won't do Y."
Threats can also be unconditional, as in, "I'll do Y." Threats of this form are uncommon, because they don't require the target to undertake any action the perpetrator might find desirable. They merely inform the target that harm lies in the target's future. However, unconditional threats do serve as demonstrations of power, as in, "I'm about to harm you by doing Y, and there is nothing you can do about it."
Because threatening is so widely viewed as unacceptable behavior, sophisticated abusers often deliver threats in private.
Talking over
Talking over someone is the practice of speaking while another person is speaking. When it happens accidentally, the partners halt immediately to politely resolve the collision. But talking over can occur intentionally as well. There are two modes: Defensive Talking Over and Offensive Talking Over. If Speaker 1 refuses to yield even after Speaker 2 interrupts to begin talking, then Speaker 1 is engaged in Defensive Talking Over. In that instance, Speaker 2 is engaged in Offensive Talking Over. When these incidents occur, a voice volume contest often ensues.
Talking over another person can be abusive or disrespectful, depending on the intensity of the incident. But it isn't a favored tactic of sophisticated perpetrators. Although both modes (Offensive and Defensive) are potentially abusive, neither is deniable, at least not plausibly so. Usually, these incidents occur between rivals as part of a pattern of long standing.
Even though these tactics are visible to all, the perpetrator can nevertheless deny that they were intended to be abusive. A name is mispronounced accidentally; the threat delivered in private "never happened;" the talking over was perhaps "excessively passionate," but not abusive. We all see what's happening, but because of the perpetrator's skill, we're compelled to admit that perhaps abuse did not actually occur. With enough repetition, though, the perpetrators can be found out.

In a future post I'll examine tactics that are more difficult to identify, even if repeatedly employed. Go to top Top  Next issue: Gratuitous Use of Synonyms, Aliases, and Metaphors  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenfHlRlTgqCIXkUHBTner@ChacrEuHRQPYVKkOucGfoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

U.S. coinsThe Fine Art of Quibbling
We usually think of quibbling as an innocent swan dive into unnecessary detail, like calculating shares of a lunch check to the nearest cent. In debate about substantive issues, a detour into quibbling can be far more threatening — it can indicate much deeper problems.
A lizardfish in a typical poseStonewalling: I
Stonewalling is a tactic of obstruction used by those who wish to stall the forward progress of some effort. Whether the effort is a rival project, an investigation, or just the work of a colleague, the stonewaller hopes to gain advantage. What can you do about stonewalling?
1988 Nobel Laureate Leon Lederman celebrating his eightieth birthdayPolitical Framing: Strategies
In organizational politics, one class of toxic tactics is framing — accusing a group or individual by offering interpretations of their actions to knowingly and falsely make them seem responsible for reprehensible or negligent acts. Here are some strategies framers use.
U.S. Troops in Viet Nam, 1961-1968Patterns of Conflict Escalation: II
When simple workplace disagreements evolve into workplace warfare, they often do so following recognizable patterns. If we can recognize the patterns early, we can intervene to prevent serious damage to relationships. Here's Part II of a catalog of some of those patterns.
A meeting of a small team working to resolve a serious matterAsking Burning Questions
When we suddenly realize that an important question needs answering, directly asking that question in a meeting might not be an effective way to focus the attention of the group. There are risks. Fortunately, there are also ways to manage those risks.

See also Conflict Management and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

Someone got the wrong information about which sneakers to wear on which feetComing April 30: On Planning in Plan-Hostile Environments: II
When we finally execute plans, we encounter obstacles. So we find workarounds or adjust the plans. But there are times when nothing we try gets us back on track. When this happens for nearly every plan, we might be working in a plan-hostile environment. Available here and by RSS on April 30.
A dramatization of a mobbing incidentAnd on May 7: Subject Matter Bullying
Most workplace bullying tactics have analogs in the schoolyard — isolation, physical attacks, name-calling, and rumor-mongering are common examples. Subject matter bullying might be an exception, because it requires expertise in a sophisticated knowledge domain. And that's where trouble begins. Available here and by RSS on May 7.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenfHlRlTgqCIXkUHBTner@ChacrEuHRQPYVKkOucGfoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Bluesky, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.