10 Tips for Dealing with a Bully Boss
- 05 November, 2007 14:21
Is your boss a tyrant of Machiavellian proportions? If it makes you feel better, you're not alone. According to a study by the Employment Law Alliance, almost half of all employees have been targeted by a bully boss.
Do you have a boss who is off the wall - we're talking certifiably nuts? If it's any consolation, take comfort in knowing that you have more company than you can imagine. The simple truth is that bully or tyrant bosses can be found in abundance. Unfortunately, the majority can't legally be institutionalized. Many should not be bosses.
Tyrannical behaviour comes in all forms. There are bosses who are mind-controlling abusers, manic-depressive and psychotic. There are obnoxious bully bosses who rule by intimidation, insist on getting their way and fly off the handle easily. They treat subordinates like children and seldom ask for anyone's input. There are also predator bosses, a term that is explained in management consultant Harvey Hornstein's book, Brutal Bosses and Their Prey (Penguin Putnam), in which he defines two species of tyrannical bosses: "The Conqueror" and "The Manipulator".
Conqueror bosses prey on employees' weaknesses. They find great thrills in treating the workplace like a battlefield. Once they sense an employee's soft spot, they pounce on it. The unsuspecting victim doesn't stand a chance.
Manipulator bosses are the smoothest of bullies. They fear becoming less valued if their underlings get any recognition for exemplary work. Manipulator bosses are backstabbers who'll go to frightening lengths to look good to their superiors.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Best Practices for Migrating to SharePoint 2013
This white paper details a number of best practices for migrating to SharePoint 2013. These best practices also apply to migrations to most earlier versions of SharePoint. Download now.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.