Workplace Bullying and Harassment

Total Page:16

File Type:pdf, Size:1020Kb

Workplace Bullying and Harassment Law and Policy Remedies for Workplace Bullying in Higher Education: An Update and Further Developments in the Law and Policy John Dayton, J.D., Ed. D.* A dark and not so well kept secret lurks the halls of higher education institutions. Even among people who should certainly know better than to tolerate such abuse, personnel misconduct in the form of workplace bullying remains a serious but largely neglected problem.1 A problem so serious it can devastate academic programs and the people in them. If allowed to maraud unchecked, workplace bullies can poison the office culture; shut down progress and productivity; drive off the most promising and productive people; and make the workplace increasingly toxic for everyone who remains in the bully dominated environment.2 A toxic workplace can even turn deadly when stress begins to take its all too predictable toll on victims’ mental and physical health, or interpersonal stress leads to acts of violence.3 Higher education institutions are especially vulnerable to some of the most toxic forms of workplace bullying. When workplace bullies are tenured professors they can become like bullying zombies seemingly invulnerable to efforts to stop them while faculty, staff, students, and even university administrators run for cover apparently unable or unwilling to do anything about the loose-cannons that threaten to sink them all. This article examines the problem of workplace bullying in higher education; reviews possible remedies; and makes suggestions for law and policy reforms to more effectively address this very serious but too often tolerated problem in higher education. * This article is dedicated to the memory of Anne Proffitt Dupre, Co-Director of the Education Law Consortium, Professor of Law, Law Clerk for the U.S. Supreme Court and the U.S. Court of Appeals for the Eleventh Circuit, trusted friend and colleague, and zealous advocate for justice and civility in the workplace. John Dayton is a Professor of Education Law and Adjunct Professor of Higher Education at the University of Georgia. 1 See David C. Yamada, Workplace Bullying and American Employment Law: A Ten-Year Progress Report and Assessment, 32 COMP. LAB. L. & POL’Y J. 251, 253 (2010) (“Overall, workplace bullying remains the most neglected form of serious worker mistreatment in American employment law”). See also Irvin Lawrence et al., Bullying and Harassment in the Workplace: An International Perspective, 23 EMP. & INDUS. REL. L. 24, 24 (2013) (“In spite of its increasing prevalence, workplace harassment and specifically bullying continues to be under- reported and is often ignored by employers”); Susan H. Duncan, College Bullies—Precursors to Campus Violence: What Should Universities and College Administrators Know About the Law?, 55 VILL. L. REV. 269, 269 (2010). (“attention has not been devoted to post-adolescent bullying, despite the continuing propensities of grade school and high school bullies to torment others in college and later in the workplace”). 2 Yamada, supra note 1, at 274 (2010) (citing a 2008 Joint Commission medical accrediting standard recognizing that acts such as workplace bullying and harassment “can foster medical errors, contribute to poor patient satisfaction and to preventable adverse outcomes, increase the cost of care, and cause qualified clinicians, administrators and managers to seek new positions in more professional environments”). 3 See Florence Z. Mao, Is Litigation Your Final Answer? Why the Healthy Workplace Bill Should Include an ADR Provision, 21 J.L. & POL’Y 679, 686 (2013) (“Targets experience psychological effects such as stress, depression, loss of sleep, and low self-esteem, as well as feelings of shame, guilt, and embarrassment. In more severe instances, they may develop posttraumatic stress disorder, which, if left untreated, may cause an individual to react violently against either the bully or another coworker”). See also Duncan, supra note 1, at 276 (describing campus violence resulting from bullying). 1 Defining Workplace Bullying Workplace bullying may take as many forms as there are perpetrators and circumstances. It may be overt or covert; simple-minded or elaborately Machiavellian. The most candid definition for workplace bullying may be the definition given to obscenity by Justice Douglas: “I know it when I see it.”4 But while those exposed to workplace bullying may recognize it when they see it,5 articulating a precise legal definition can be challenging. Nonetheless, an adequate working definition is essential to assure due process and the fair, efficient, and effective administration of employment laws and institutional policies.6 In understanding and defining workplace bullying it may also be useful to define what it is not. Workplace bullying is not an expression of free speech.7 It is not the exercise of academic freedom.8 Nor is it mere incivility or interpersonal rudeness.9 Workplace bullying is an egocentric, intentional, and systematic effort to harm others in the workplace, a serious act of employment misconduct. Perpetrators do not commonly cross the line to criminality. But like a criminal act there is both an actus reas and a mens rea in workplace bullying. Workplace bullying involves acts that breach the bounds of acceptable workplace conduct and do so with the intent to harm others. Workplace bullying is not a mere accident or interpersonal misunderstanding. It involves intentional acts knowingly aimed at targeted victims with the purpose of inflicting psychological suffering and other harms.10 There are varied definitions of workplace bullying, but many share common elements including language concerning prohibited acts; intent to harm; patterns of interpersonal misconduct; negative impacts on victims; and interference with workplace performance.11 Yamada defined workplace bullying as “the intentional infliction of a hostile work environment upon an employee by a coworker or coworkers, typically through a combination of verbal and 4 Jacobellis v. Ohio, 378 U.S. 184, 197 (1964) (Stewart, J., concurring). 5 A key challenge in rallying support for the adoption of protective policies is that people often don’t get the problem until it gets them. Compare Pastor Martin Niemöller (1892-1984) (“They came for the Jews, and I didn’t speak up because I wasn’t a Jew. Then they came for me and by that time no one was left to speak up”). 6 JOHN DAYTON, EDUCATION LAW: PRINCIPLES, POLICIES, AND PRACTICE 240 (2012) (summarizing essential principles of due process in educational institutions). 7 Connick v. Myers, 461 U.S. 138 (1983) (matters of personal concern and not public concern are not protected speech in the workplace). 8 AMERICAN ASSOCIATION OF UNIVERSITY PROFESSORS (AAUP), STATEMENT OF PRINCIPLES ON ACADEMIC FREEDOM AND TENURE (1940) (recognizing that concerning the exercise of academic freedom faculty “should at all times be accurate, should exercise appropriate restraint, should show respect for the opinions of others”). 9 See Mao, supra note 3, at 684-685 (2013) (“Unlike general aggression or incivility, which involve isolated instances of rudeness or crass behavior, workplace bullying involves repetition, duration, and escalation, creating an ongoing pattern of abusive behavior”). See also GARY NAMIE & RUTH F. NAMIE, THE BULLY-FREE WORKPLACE 6 (2011) (“Compared with incivility, bullying is a laser-focused, systematic campaign of interpersonal destruction”). 10 See Jordan F. Kaplan, Help is on the Way: A Recent Case Sheds Light on Workplace Bullying, 47 HOUS. L. REV. 141, 142 (2010) (“Workplace bullying consists of repeated hostile behavior designed to empower the bully at the expense of the victim”; “Many victims of bullying suffer psychological damage similar to post-traumatic stress disorder”). 11 See also Mao, supra note 3, at 684 (2013) (“definitions have three unifying themes: (1) the bullying activity is persistent and intentional; (2) the Target suffers a combination of psychological, physical, and economic harm as a result; and (3) the bullying activity creates an overall hostile work environment”). 2 nonverbal behaviors.”12 Tepper & White defined workplace bullying in academic settings as follows: [W]orkplace bullying . is commonly defined as behavior by a perpetrator that may involve repeated verbal abuse, offensive conduct that may threaten, humiliate, or intimidate a target, or efforts to sabotage a target's performance. As commonly defined, the subject behavior is intentional, results in physical or psychological harm to the target, and makes the target's job performance more difficult.13 Workplace bullying in academia is often not just the employment misconduct of a lone perpetrator. Tepper & White recognized an especially dangerous form of workplace bullying in academia, “academic mobbing” perpetrated by groups: “At times, perpetrators, who may include administrators and faculty members, combine their efforts to abuse and harass the target, a phenomenon known as ‘mobbing.’”14 Concerning the prevalence of workplace bullying evidence suggests that workplace bully is “an epidemic, with fifty-four million people--amounting to 37% of American workers--who have reported being the victims of bullying.”15 Further, the impact of workplace bullying is likely to extend far beyond its direct targets, damaging morale and productivity throughout the organization.16 Although workplace bullying may sometimes include status-based harassment related to race, color, religion, sex, national origin, age, disability, etc., non-status based workplace
Recommended publications
  • Boundaries, Ethics and Self Care
    Boundaries, Ethics and Self Care David Convirs Elizabeth “Liz” Peoples Boundaries PROFESSIONAL AND PERSONAL Personal Boundaries • Guidelines, rules or limits • Created to identify what are reasonable, safe and permissible ways for other people to behave around the creator • How they will respond when someone steps outside those limits Professional Boundaries • Professional boundaries define effective and appropriate interaction between professionals and the public they serve • Boundaries exist to protect both the volunteer and the client • Do you know how to treat all staff members fairly without positive or negative feelings influencing your decisions Oregon’s Expectations (Mandatory) • Represent all aspects of professional capabilities and services honestly and accurately • Ensure that all actions with a client are based on understanding and implementing the core values of caring, respect, compassion, appropriate boundaries, and appropriate use of personal power • Develop alliances with the client, colleagues, other health care providers, and the community to provide care and services that are safe, effective, and appropriate to the client’s needs • Develop and incorporate respect for diverse client backgrounds including a client's clinical diagnosis, lifestyle, sexual orientation, race, gender, ethnicity, religion, age, and socioeconomic background when planning and providing services • Act as an advocate for client and client’s needs • Respect the client's right and responsibility for self-determination in making health care choices
    [Show full text]
  • A Solution for Elder Bullying
    WIEGAND.DOCX (DO NOT DELETE) 1/27/2020 11:06 AM “LIKE MEAN GIRLS, BUT EVERYONE IS EIGHTY”: A SOLUTION FOR ELDER BULLYING Brittany Wiegand* Bullying has long been an adolescent issue. With the elderly population ever-growing, however, so too does the incidence of elder bullying. Bullying behaviors often occur in small group settings with members who interact regularly, such as in schools. Senior living communities also fit this description. Bullies in senior communities may engage in verbal and even physical abuse; in the worst cases, bullying can be fatal. Instances of bullying among older adults are likely to increase in frequency as this population grows. This Note evaluates current federal and state laws that bullying victims might use to seek redress. It argues that current state laws should be amended to include seniors by aligning laws with research-based definitions of bullying. This Note also recommends providing a private right of action and implementing research-based programming in communal living centers. I. Introduction Flipped tables and false accusations: two unlikely scenes from a nursing home. Though one might expect something like this to occur at a middle school, each is only a minor component of one woman’s ex‐ perience in an elderly living community where she faced a torrent of physical and verbal abuse from other residents due to her sexual orien‐ tation.1 Brittany Wiegand is the Editor‐in‐Chief 2019–2020, Member 2018–2019, The Elder Law Journal; J.D. 2020, University of Illinois, Urbana‐Champaign; M.A. 2011, Curriculum & Instruction, Louisiana State University; B.A.
    [Show full text]
  • Self-Presentation Tactics in Social Media Han-Yun HUANG
    2014 International Conference on Social Science (ICSS 2014) Self-presentation Tactics in Social Media Han-Yun HUANG School of Journalism and Communication, Xiamen University, Fujian, China. Keywords: Self-presentation, Social Media, Adolescents Abstract. Social media now are very popular. Many people use them everywhere through mobile phones. One of the most important motives people using social media is for self-presentation. This study focuses on discussing the self-presentation tactics adolescents use in social media. The results show that adolescents mainly use four self-presentation tactics in social media, namely, self-promotion, ingratiation, manipulation and damage control. These four self-presentation tactics will be discussed in details. Introduction Social media are applications that enable people to interact with each other and build social networks that increase social capital (Barnes, 2008). Kaplan and Haenlein (2010) defined social media more theoretically as “a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, which allow the creation and exchange of user-generated content” (p. 64). Spannerworks (2007) gave a similar working definition of social media as new kinds of online media that share most or all of the characteristics of participation, openness, conversation, community and connectedness. Comm (2010) suggested that the “social” part of social media means that “publishing is now about participation” (Comm, 2010, p. 3). Those who use social media sufficiently create not only content, but also conversations, and those conversations combine further to create communities (Comm, 2010). Results from focus groups among adolescents in urban China indicated that IM, SNS, blogs, and microblogs were their four most widely used social media.
    [Show full text]
  • Management Assistance Program
    Management Resources Management Assistance Program SETTING BOUNDARIES AT WORK: Helping others to understand your boundaries while respecting and protecting theirs GOALS: The goal of this module is to provide organizations, managers and employees with the tools necessary to set and abide by boundaries in the workplace to create a healthy and productive work environment. The specific goals are to help organizations, managers, and employees: • Understand the importance of boundary setting • Learn how to set and maintain boundaries OVERVIEW: According to educators at the University of California, San Francisco, “When we talk about needing space, setting limits, determining acceptable behavior, or creating a sense of autonomy, we are really talking about boundaries. It is a general misconception that having good boundaries will distance you from others. However, the truth is that when you know where you end and others begin, you can closely engage with others because you will not feel overwhelmed or unprotected.”1 Boundaries are important in the workplace because they define the limits and responsibilities of the people with whom you interact in the workplace. When workplace boundaries are clearly defined, the organization works more efficiently. Setting proper boundaries can result in a sense of accountability for all staff members. Job responsibilities can be more precisely assigned, and job performance can be more accurately measured. Boundaries are the invisible lines that are drawn to help define roles and interactions in relationships. When these lines are crossed, negative consequences may result. Having weak boundaries or no boundaries at all is as debilitating as violating boundaries. 1 “Setting Healthy Workplace Boundaries.” University of California, San Francisco.
    [Show full text]
  • Measuring and Addressing Elderly Bullying in a Senior Residential Community Heather Jeffries Malone University
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by ScholarWorks at WMU The Journal of Sociology & Social Welfare Volume 45 Article 8 Issue 3 September 2018 Measuring and Addressing Elderly Bullying in a Senior Residential Community Heather Jeffries Malone University Karen Slovak Malone University, [email protected] Sylvester Huston Social Work Student Follow this and additional works at: https://scholarworks.wmich.edu/jssw Recommended Citation Jeffries, Heather; Slovak, Karen; and Huston, Sylvester (2018) "Measuring and Addressing Elderly Bullying in a Senior Residential Community," The Journal of Sociology & Social Welfare: Vol. 45 : Iss. 3 , Article 8. Available at: https://scholarworks.wmich.edu/jssw/vol45/iss3/8 This Article is brought to you for free and open access by the Social Work at ScholarWorks at WMU. For more information, please contact [email protected]. Measuring and Addressing Elderly Bullying in a Senior Residential Community Heather Jeffries University of Kentucky Karen Slovak Malone University Sylvester Huston Social Work Student Elderly bullying lags far behind in research endeavors compared to related topics of youth bullying and elder abuse. This particular study is unique in its examination of bullying among elderly residents from independent and assisted living communities. This action-oriented study collected surveys from 98 residents of a Midwest senior residential community to determine levels, location, and responses to bullying by residents as well as to inform administration of appropriate responses. Results indicated that approximately one in four residents responded that they had seen or heard another resident being bullied at some point. Residents also reported their experiences with social, physical, verbal, and electronic bullying within the past six months.
    [Show full text]
  • Bullying Prevention Lending Library
    BULLYING PREVENTION LENDING LIBRARY Educator Resources Adina's Deck. Award winning DVD series about the fictional detective club, "Adina's Deck" a group of friends who help solve challenges current to today's young people. Grades 4 – 8. Bully-Book. An electronic book with follow-up questions. Grades K – 3. Bully Busters. Arthur M. Horne, Christi L. Bartolomucci and Dawn Newman-Carlson. Teaching manual for helping bullies, victims and bystanders. Grades K – 5. The Bully Free Classroom by Allan L. Beane, PhD. Grades K – 8. Bully Free Lesson Plans by Allen L. Beane, PhD, Linda Beane and Pam Matlock, MA. Grades K – 8. Bully Proof. Developed by Nan Stein, Emily Gaberman and Lisa Sjostrum. A teacher’s guide on teasing and bullying for use in grades 4 – 5. Bully Safe Schools. DVD Bullying Hurts Everyone. DVD. Bullying K – 5: Introductory Videos for Elementary School Students, Teachers, and Parents from the authors of Olweus Bullying Prevention Program. DVD. Bullying 6 – 8: Introductory Videos for Middle School Students, Teachers, and Parents from the authors of Olweus Bullying Prevention Program. DVD. Bullying: Prevention and Intervention for School Staff. Channing Bete. DVD. Class Meetings That Matter from Olweus Bullying Prevention Program. Grades K – 5 & 6 – 8. Cyber Bullying: A Prevention Curriculum by Susan P. Limber, Ph.D., Robin M. Kowalski, Ph.D., and Patricia W. Agatston, Ph.D. Grades 3 – 5 and 6 – 12. Cyberbullying—Safe to Learn: Embedding nti-bullying work in schools from the Pennsylvania Department for Children, Schools and Families. Deanna’s Fund Bullying Prevention Kit. Kit includes a DVD with segments of the theatrical production Doin’ the Right Thing, teacher’s guide and activities.
    [Show full text]
  • The Foreign Service Journal, October 2012
    PUBLISHED BY THE AMERICAN FOREIGN SERVICE ASSOCIATION OCTOBER 2012 THE NEW FOREIGN SERVICE GENERATION TEHRAN, 1979: THE UNTOLD STORY LOCAL LENS DEBUTS FOREIGN October 2012 SERVICE Volume 89, No. 10 FOCUS THE NEW FOREIGN SERVICE GENERATION AFSA NEWS Today’s New Hires: What They See, What They Say / 22 AFSA Celebrates High School Essay Contest Winner / 57 The hiring wave that began in 2008 with State’s Diplomacy 3.0 program and USAID’s Development Leadership Initiative increased these agencies’ State VP: Staying in Place Foreign Service ranks by 17 and 54 percent, respectively. Here’s a look in an Up-or-Out System / 58 at the new hires’ thoughts and expectations about their work. FCS VP: Water Under BY SHAWN DORMAN the Bridge / 59 FAS VP: The Mid-Level The Hiring Pendulum / 25 Staffing Gap / 60 The boom and bust hiring cycles at State and USAID have created serious staffing problems. FSOs Help Bosnian Street Dogs Survive / 60 BY SHAWN DORMAN Ambassador Chas Freeman Gen Y, and On to Z / 28 Gives Adair Lecture / 61 A retired ambassador shares her impressions of the new generations. AFSA Bylaw Amendments Pass / 63 BY EILEEN MALLOY TLG Intern Has “Fantastic” What I Wish I Had Known … / 38 Summer at State / 63 New hires talk about what they wish they had known before joining COLUMNS the Foreign Service. EDITED BY SHAWN DORMAN President’s Views / 7 Diplomatic Capacity Needs Professional Institutional Bridging the Foreign Service Generational Gulf / 42 Leadership More than half of the current Foreign Service has joined since 9/11. BY SUSAN R.
    [Show full text]
  • Tactics of Impression Management: Relative Success on Workplace Relationship Dr Rajeshwari Gwal1 ABSTRACT
    The International Journal of Indian Psychology ISSN 2348-5396 (e) | ISSN: 2349-3429 (p) Volume 2, Issue 2, Paper ID: B00362V2I22015 http://www.ijip.in | January to March 2015 Tactics of Impression Management: Relative Success on Workplace Relationship Dr Rajeshwari Gwal1 ABSTRACT: Impression Management, the process by which people control the impressions others form of them, plays an important role in inter-personal behavior. All kinds of organizations consist of individuals with variety of personal characteristics; therefore those are important to manage them effectively. Identifying the behavior manner of each of these personal characteristics, interactions among them and interpersonal relations are on the basis of the impressions given and taken. Understanding one of the important determinants of individual’s social relations helps to get a broader insight of human beings. Employees try to sculpture their relationships in organizational settings as well. Impression management turns out to be a continuous activity among newcomers, used in order to be accepted by the organization, and among those who have matured with the organization, used in order to be influential (Demir, 2002). Keywords: Impression Management, Self Promotion, Ingratiation, Exemplification, Intimidation, Supplication INTRODUCTION: When two individuals or parties meet, both form a judgment about each other. Impression Management theorists believe that it is a primary human motive; both inside and outside the organization (Provis,2010) to avoid being evaluated negatively (Jain,2012). Goffman (1959) initially started with the study of impression management by introducing a framework describing the way one presents them and how others might perceive that presentation (Cole, Rozelle, 2011). The first party consciously chooses a behavior to present to the second party in anticipation of a desired effect.
    [Show full text]
  • Cyberbullies on Campus, 37 U. Tol. L. Rev. 51 (2005)
    UIC School of Law UIC Law Open Access Repository UIC Law Open Access Faculty Scholarship 2005 Cyberbullies on Campus, 37 U. Tol. L. Rev. 51 (2005) Darby Dickerson John Marshall Law School Follow this and additional works at: https://repository.law.uic.edu/facpubs Part of the Education Law Commons, Legal Education Commons, and the Legal Profession Commons Recommended Citation Darby Dickerson, Cyberbullies on Campus, 37 U. Tol. L. Rev. 51 (2005) https://repository.law.uic.edu/facpubs/643 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Open Access Faculty Scholarship by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. CYBERBULLIES ON CAMPUS Darby Dickerson * I. INTRODUCTION A new challenge facing educators is how to deal with the high-tech incivility that has crept onto our campuses. Technology has changed the way students approach learning, and has spawned new forms of rudeness. Students play computer games, check e-mail, watch DVDs, and participate in chat rooms during class. They answer ringing cell phones and dare to carry on conversations mid-lesson. Dealing with these types of incivilities is difficult enough, but another, more sinister e-culprit-the cyberbully-has also arrived on law school campuses. Cyberbullies exploit technology to control and intimidate others on campus.' They use web sites, blogs, and IMs2 to malign professors and classmates.3 They craft e-mails that are offensive, boorish, and cruel. They blast professors and administrators for grades given and policies passed; and, more often than not, they mix in hateful attacks on our character, motivations, physical attributes, and intellectual abilities.4 They disrupt classes, cause tension on campus, and interfere with our educational mission.
    [Show full text]
  • The Whistle, January 2013
    “All that is needed for evil to prosper is for people of good will to do nothing”—Edmund Burke The Whistle No. 73, January 2013 Newsletter of Whistleblowers Australia Whistleblower John Kiriakou to go to prison — see pages 9–10 Media watch Whistleblower reveals American had a conversation with two After a week-long “witch-hunt” by doctors while she was in the room. senior students, police have been Armstrong threats According to Betsy, Armstrong drafted to investigate violent threats Sydney Morning Herald admitted then that he had been taking against so-called “moles” and whistle- 16 October 2012, p. 18 erythropoietin, testosterone, growth blowers who have been exposing the hormone, cortisone and steroids to college’s mob rule culture from within. LONDON: Lance Armstrong has been improve his cycling. accused of using intimidation and David Walsh, a journalist, became threats in a desperate bid to stop a aware of that incident via an off-the- whistleblower going public with record statement from Betsy in 2003 claims about his alleged drug use. but Armstrong quickly got word that Armstrong, who maintains his inno- she had revealed his secret. cence, has been stripped of his seven He responded by starting an intimi- Tour de France titles by the US Anti- dation campaign that lasted years. Doping Agency and banned from the First he sent Frankie, who briefly sport for life after the organisation used erythropoietin at Armstrong’s claimed he orchestrated the most urging, an email that read: “Helping to sophisticated doping program ever bring me down is not going to help seen.
    [Show full text]
  • The Views of the U.S. Left and Right on Whistleblowers Whistleblowers on Right and U.S
    The Views of the U.S. Left and Right on Whistleblowers Concerning Government Secrets By Casey McKenzie Submitted to Central European University Department of International Relations and European Studies In partial fulfillment of the requirements for the degree of Master of Arts Supervisor: Professor Erin Kristin Jenne Word Count: 12,868 CEU eTD Collection Budapest Hungary 2014 Abstract The debates on whistleblowers in the United States produce no simple answers and to make thing more confusing there is no simple political left and right wings. The political wings can be further divided into far-left, moderate-left, moderate-right, far-right. To understand the reactions of these political factions, the correct political spectrum must be applied. By using qualitative content analysis of far-left, moderate-left, moderate-right, far-right news sites I demonstrate the debate over whistleblowers belongs along a establishment vs. anti- establishment spectrum. CEU eTD Collection i Acknowledgments I would like to express my fullest gratitude to my supervisor, Erin Kristin Jenne, for the all the help see gave me and without whose guidance I would have been completely lost. And to Danielle who always hit me in the back of the head when I wanted to give up. CEU eTD Collection ii Table of Contents Abstract ....................................................................................................................................... i Acknowledgments.....................................................................................................................
    [Show full text]
  • Cults of Personality, Preference Falsification, and the Dictator's
    Cults of personality, preference falsification, and the dictator's dilemma Charles Crabtreex, Holger L. Kerny, and David A. Siegelz Abstract: We provide a novel rational explanation for why cults of personality exist: they solve the dictator's adverse selection problem in assigning subordinates to roles within the regime. Participation in a cult of personality is psychologically costly whenever it involves preference falsification, with the costs varying across individuals. Importantly, low psychological costs of preference falsification are correlated with traits the dictator values, such as unscrupulousness and ruthlessness, which we collectively term disposition-based competence. Under a wide variety of circumstances, this correlation makes participation in cults of personality informative from the dictator's point of view, allowing him to hire loyal and competent subordinates for the most important regime positions. In contrast to earlier formal work, our model implies that dictators can use cults of personality to avoid the loyalty-competence trade-off when promoting subordinates. We thank Quintin Beazer, Jens Grosser, Timur Kuran, Andrew Little, Eddy Malesky, Melanie Manion, Arturas Rozenas, Rory Truex, Nils Weidmann, and participants at the 2017 MPSA Conference and the 2017 ESTA workshop at Konstanz University for their very helpful feedback. x PhD cand., Department of Political Science, University of Michigan. y Assistant Professor, Department of Political Science, Florida State University. z Associate Professor, Department of Political Science, Duke University. In 2001, Saparmurad Niyazov, who ruled Turkmenistan from 1985 to 2006, announced the publication of his first book. Called Ruhnama (The Book of the Soul), it contained answers to \all of life's questions" and became required reading in all schools, universities, and workplaces.
    [Show full text]