<<

University of South Carolina Scholar Commons

Theses and Dissertations

Spring 2020

Sticks and Stones May Break My Bones: as Social Influence

Jason Kautz

Follow this and additional works at: https://scholarcommons.sc.edu/etd

Part of the Business Administration, Management, and Operations Commons

Recommended Citation Kautz, J.(2020). Sticks and Stones May Break My Bones: Social Undermining as Social Influence. (Doctoral dissertation). Retrieved from https://scholarcommons.sc.edu/etd/5839

This Open Access Dissertation is brought to you by Scholar Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Scholar Commons. For more , please contact [email protected]. STICKS AND STONES MAY BREAK MY BONES: SOCIAL UNDERMINING AS SOCIAL INFLUENCE

by

Jason Kautz

Bachelors of Science Canisius College, 2010

Masters of Business Administration Canisius College, 2013

Submitted in Partial Fulfillment of the Requirements

For the Degree of Doctor of Philosophy in

Business Administration

Darla Moore School of Business

University of South Carolina

2020

Accepted by:

M. Audrey Korsgaard, Major Professor

Robert E. Ployhart, Committee Member

Nichelle Carpenter, Committee Member

Timothy Fry, Committee Member

Cheryl L. Addy, Vice Provost and Dean of the Graduate School © Copyright by Jason Kautz, 2020 All Rights Reserved.

ii ACKNOWLEDGEMENTS

I would like to acknowledge the help and support I received from the wonderful community at the University of South Carolina. Specifically, I thank Cori Jones and

Sandy Bringley for always making me smile; I thank my committee members Rob

Ployhart, Nichelle Carpenter, and Tim Fry for their immeasurable help and guidance; I thank Paul Bliese for teaching me the fun of stats and analysis; and I thank my fellow doctoral students for sharing in my accomplishments and commiserating in my frustrations. I also thank Ji-Hee Kim for encouraging me to grow. Most importantly, I wish to thank my advisor, Audrey Korsgaard, for always believing in me (especially as I so often fail to believe in myself).

iii ABSTRACT

The current social undermining literature suggests the important role of the witness in determining the negative impact on the victim. However, the literature has yet to explicitly explore the witness’ role in social undermining. In this dissertation, I integrate theory and research on social influence and emotions to develop a framework that suggests social undermining be considered a form of social influence. This framework allows for the exploration of the witness’ sense-making process following a social undermining event along with the accumulated effects of repeated exposure to a series of social undermining events. I propose that social undermining influences witness perceptions of underminer and/or victim trustworthiness as well as subsequent witness behaviors. Witness relational identification with the underminer will increase the likelihood of accepting social undermining, which will facilitate feelings of contempt, while witness relational identification with the victim will decrease the likelihood of accepting social undermining, which will facilitate feelings of and fear.

Additionally, underminer power will shape the expression of behavior such that high underminer power decreases retaliatory behaviors toward the underminer. I test these premises in two empirical studies. In study 1, I utilize a critical incident recall task to explore the social influence factors that shape the witness’ response to social undermining (n = 100). Results indicate that witness’ experience feelings of contempt, anger, and fear following a social undermining event. Feelings of contempt promote negative perceptions of victim trustworthiness and encourage behaviors designed to harm

iv the victim. Feelings of anger encourage retaliatory behaviors toward underminer.

Feelings of fear encourage behaviors designed to harm the victim. In study 2, I utilize a multi-round experiment to test the influence of relational identification and underminer power on response to a campaign of social undermining (n = 308 observations). Results indicate that witness perceive the victim as progressively less trustworthy and give increasingly fewer resources to the victim over time, regardless of relational identification and underminer power. Additionally, witness’ who identify with the underminer give increasingly more resources to the underminer over time than those who identify with the victim. The results of these studies provide evidence for the significant role that the witness plays in social undermining.

v TABLE OF CONTENTS

Acknowledgements ...... iii

Abstract ...... iv

List of Tables ...... vii

List of Figures ...... viii

List of Abbreviations ...... ix

Chapter 1 Introduction ...... 1

Chapter 2 A Brief Literature Review and Integration ...... 4

Chapter 3 Study 1: Social Undermining as an Event ...... 34

Chapter 4 Study 2: Social Undermining as a Campaign...... 61

Chapter 5 Discussion ...... 96

References ...... 101

vi LIST OF TABLES

Table 3.1 Study 1 Descriptive Statistics ...... 58

Table 3.2 Study 1 Model Fit Indices ...... 59

Table 3.3 Study 1 Power Moderation Test: Multigroup Path Analysis ...... 59

Table 4.1 Study 2 Descriptive Statistics ...... 82

Table 4.2 Study 2 Model Building Log Likelihood Tests – Perceptions of Trustworthiness ...... 83

Table 4.3 Study 2 Model Building Log Likelihood Tests – Behaviors ...... 84

Table 4.4 Study 2 Model Building Log Likelihood Tests – Emotions ...... 85

Table 4.5 Study 2 Perceptions of Trustworthiness Growth Models ...... 86

Table 4.6 Study 2 Emotions Growth Models...... 87

Table 4.7 Study 2 Behavior Growth Models ...... 88

Table 4.8 Study 2 Influence of Discrete Emotions on Behavior ...... 89

vii LIST OF FIGURES

Figure 2.1 Social Influence Framework of Social Undermining ...... 33

Figure 3.1 Witness Model of Social Undermining ...... 60

Figure 4.1 Study 2 Underminer Aiding Behaviors Per Round ...... 90

Figure 4.2 Study 2 Victim Aiding Behaviors Per Round ...... 90

Figure 4.3 Study 2 Self Aiding Behaviors Per Round ...... 91

Figure 4.4 Study 2 Perceptions of Underminer Trustworthiness Per Round ...... 91

Figure 4.5 Study 2 Perceptions of Victim Trustworthiness Per Round ...... 92

Figure 4.6 Study 2 Perceptions of Victim Trustworthiness Growth (Victim Trustworthiness Model 1, Table 4.5) ...... 92

Figure 4.7 Study 2 Growth of Victim Aiding Behavior (Victim Reward Model 1, Table 4.7) ...... 93

Figure 4.8 Study 2 Growth of Fear predicted by Relational Identification (Averaged across Power Condition; Fear Model 3, Table 4.6) ...... 93

Figure 4.9 Study 2 Underminer Aiding Behavior by Relational Identification (Low Underminer Power) ...... 94

Figure 4.10 Study 2 Underminer Aiding Behavior by Relational Identification (High Underminer Power) ...... 94

Figure 4.11 Study 2 Self Aiding Behavior by Relational Identification (Low Underminer Power)…………………………………………………………………………………... 95

Figure 4.12 Study 2 Self Aiding Behavior by Relational Identification (High Underminer Power) ...... 95

viii LIST OF ABBREVIATIONS

AET ...... Affective Events Theory

CIT ...... Critical Incident Technique

COR ...... Changing Others Relationship

CWB ...... Counterproductive Behaviors

ELM ...... Elaboration Likelihood Model

ICC ...... Intraclass Correlation

ix CHAPTER 1

INTRODUCTION

Social undermining is the enactment of “behavior intended to hinder, over time, the ability to establish and maintain positive interpersonal relationships, work-related success, and favorable ” (Duffy, Ganster, & Pagon, 2002, p. 332). Unlike other forms of workplace , social undermining constitutes insidious behaviors designed to weaken by degree, rather than overt behaviors. Social undermining may be conceptualized as a campaign of discrete events that encompass the intentional enactment of negative, but ambiguous, behaviors. Each discrete event is of such low impact that, in isolation, they do not call attention to the underminer’s true intent; but the cumulative effect of such events changes the way others perceive and interact with a targeted individual. The extant literature on social undermining has provided insights into the aggressor’s motivations (Duffy, Scott, Shaw, Tepper, & Aquino, 2012; Greenbaum,

Mawritz, & Eissa, 2012; Keeves, Westphal, & McDonald, 2017; K. Y. Lee, Kim, Bhave,

& Duffy, 2016; Reh, Tröster, & Van Quaquebeke, 2018; Yu, Duffy, & Tepper, 2018) and the psychological, physiological, and behavioral outcomes of the victim (Campbell,

Chuang, Liao, Zhou, & Dong, 2017; Crossley, 2009; Duffy et al., 2002; Duffy, Ganster,

Shaw, Johnson, & Pagon, 2006; Greenbaum, Mawritz, & Piccolo, 2015; K. Y. Lee et al.,

2016; Yoo, 2013).

While there has been almost 20 years of research on social undermining, the process connecting the underminer’s actions to the consequences for the victim has not

1 been explored. Research has proposed and tested reasons why social undermining occurs.

Research has proposed and tested what social undermining does. But research has not yet explored how social undermining works. The social undermining literature currently follows an implicit assumption that social undermining behaviors influence a third-party witness, negatively changing their opinion of the victim. Yet, while the importance of acknowledging and exploring this assumption was proposed 9 years ago by Hershcovis

(2011) – and reiterated two years later by Yoo (2013) – there has yet to be any movement toward opening the black box and exploring the underlying social mechanisms that enable social undermining to be a viable behavioral choice in the modern workplace.

By integrating the literature on social undermining, social influence, and emotions, I create a framework for understanding social undermining as a social influence process in which the witness of undermining plays a critical role. This framework links the social undermining act, the emotions of the witness, and the witness’ subsequent perceptions and behaviors toward the victim and the underminer.

Additionally, this framework allows for the development of several hypothesis regarding how social undermining influences those who witness it, shaping their attitudes and behaviors.

This dissertation is broken up into three sections. In Chapter 2, I provide a brief overview of the current state of the social undermining, social influence, and emotions literature with an emphasis on how these literatures are used within the field of management. After reviewing the literature, I integrate the theories and findings into a comprehensive framework which allows for understanding social undermining as a social influence process. In Chapter 3, I use this framework to test how the third-party witness

2 to social undermining (henceforth referred to as “the witness”) reacts to social undermining attempts using field data. Specifically, the social influence framework of social undermining allows for hypotheses development and tests which illuminate how social undermining unfolds within the workplace. Additionally, the social influence framework of social undermining outlines the consequences of social undermining

“backfiring” upon the person engaged in social undermining (henceforth referred to as

“the underminer”). In Chapter 4, I use the social influence framework of social undermining to test how social undermining unfolds overtime. Using a 2 (relational identification with the underminer versus relational identification with the victim) x 2

(high underminer power versus low underminer power), multi-round behavioral lab design, I test how the within-participant manipulation of exposure to social undermining influences witness emotional and behavioral responses. I conclude with a general review of the theoretical, empirical, and practical contributions of this dissertation.

3 CHAPTER 2

A BRIEF LITERATURE REVIEW AND INTERGRATION

Despite almost 20 years of research since the construct of social undermining has been brought into the field of management, there is a surprising lack of clarity surrounding the social processes of social undermining. Similar constructs – such as , , and – have been widely studied, leading to the implementation of workplace practices and policies that have limited their damaging effects. Yet, while we know a lot about what leads the underminer to engage in social undermining and the physiological and psychological outcomes for the victim of social undermining, the actual mechanisms of social undermining remain a black box.

In this chapter, I first review and organize the social undermining literature to highlight what is known (e.g., motivations of the underminer and consequences for the victim) and what remains unknown (e.g., the witness role and the social undermining process). Next, I review two additional literatures: social influence and emotions. I propose that the theories, concepts, and empirical evidence contained in these literatures provide guidance and insight into understanding what is unknown about social undermining.

Following this review, I integrate the literature streams on social undermining, social influence and emotions, to create a social influence framework of social undermining. I propose that social undermining be understood as a social phenomenon involving three actors – the underminer, the victim, and the witness – and their respective

4 dyadic-relationships. This framework outlines how social undermining works through indirect social processes associated with the witness to ultimately harm the victim. The development of such a social influence framework of social undermining allows for the development of hypotheses surrounding the witness’ role in social undermining.

2.1 SOCIAL UNDERMINING

Social undermining is the enactment of “behaviors intended to hinder, over time, the ability to establish and maintain positive interpersonal relationships, work-related success, and favorable ” (Duffy, Ganster, & Pagon, 2002, p. 332). Social undermining can be expressed as damaging comments (e.g., belittling the victim or their ideas), (e.g., withholding relevant information and resources), and negative gossip (e.g., spreading damaging rumors about the victim. As such, social undermining may be considered a form of interpersonal deviance. Some forms of undermining, such as sabotage, are behavioral and directed at the victim. These forms of undermining directly affect the victim’s performance. The consequences for performance are observed and, presumably, the witness is unaware of the role of the underminer. Thus, the witness attributes the poor performance to the victim and the victim’s reputation becomes damaged. Other forms of undermining, such as damaging comments and negative gossip, are verbal and directed at the witness. These forms of undermining are designed to influence the witness’ attributions of the victim through a process of social influence.

This review offers three important insights from the social undermining literature.

First, research suggests two, independent motivations ( and bottom-line mentality) that promote enactment of social undermining. Second, research on the victim of social undermining finds results similar to what would be expected from related forms of

5 aggression (for a review of the victim role in the broad aggression literature, see Aquino

& Thau, 2009). Specifically, social undermining lowers a victim’s psychological well- being by removing their in the work place. Third, the extant research focuses solely on either the underminer or the victim. None of the studies published to this point have approached social undermining from the witness’ perspective. This dearth of theoretical or empirical examination of the witness’ role is surprising considering that, in her review of the literature, Hershcovis (2011) stated social undermining to be a unique form of aggression due to its reliance on third-party attributions of the target.

2.1.1 UNDERMINER’S MOTIVATION

Social undermining may be triggered by observations or expectations of a rivals superior performance (Duffy, Ganster, Shaw, Johnson, & Pagon, 2006; Lam, Van der

Vegt, Walter, & Huang, 2011; Reh, Tröster, & Van Quaquebeke, 2018). This prompts feelings of social comparisons that may engender feelings of envy (e.g., Campbell,

Chuang, Liao, Zhou, & Dong, 2017; Duffy et al., 2012; E. Kim & Glomb, 2014) and/or activate bottom-line mentality (Greenbaum et al., 2012; Wolfe, 1988). Feelings of envy create uncomfortable sensations within an individual, akin to pain (Lieberman &

Eisenberger, 2009). In seeking to alleviate this discomfort, individuals may engage in undermining behaviors as a means of bolstering one’s self-esteem at the expense of another (Wert & Salovey, 2004). Thus, envious underminers seek to preserve or enhance their social standing by undermining their perceived rivals (Cohen-Charash, 2009; Duffy et al., 2012; Dunn & Schweitzer, 2006; R. H. Smith & Kim, 2007; Tesser & Collins,

1988). Bottom-line mentality focuses an individual’s attention on a singular (Wolfe,

6 1988). Such focused attention promotes the oversimplification of information during decision making and encourages a zero-sum approach (Callahan, 2004). Approaching situations in such a manner engenders adversarial relationships as individuals place more emphasis on their own outcomes above all else (Levinson, 1970).

Recent research suggests that social undermining may be dependent on the relationship quality between the underminer and the victim. Yu, Duffy, and Tepper

(2018) surveyed -subordinate dyad pairs over three time periods and found that the likelihood that were to engage in undermining behaviors was influenced by perceptions of the subordinate’s warmth. Specifically, warm subordinates prompted supervisors to engage in self-improvement activities whereas cold subordinates prompted supervisors to engage in social undermining behaviors.

2.1.2 VICTIM’S OUTCOMES

From the victim’s perspective, social undermining is a norm-violating phenomenon that constitutes a breach of justice (Bies, 2005; Bies & Tripp, 2005; Duffy et al., 2006). Greenbaum, Mawritz, and Piccolo (2015) found that in situations where employees expect high levels of interpersonal justice, supervisor’s social undermining behaviors lead to higher perception of leader hypocrisy and greater intentions to .

Victims of social undermining are more likely to experience somatic complaints, , and reduced self-efficacy (Duffy et al., 2002, 2006) as well as decreases in creativity and self-esteem (Eissa, Chinchanachokchai, & Wyland, 2017). Additionally, victimized employees strive to make sense of their experience (Crossley, 2009; Porath &

Erez, 2007). Such sense-making processes lead to an increase in mental effort as victims attempt to regulate ruminative thought and associated emotions (Denson, Pedersen,

7 Friese, Hahm, & Roberts, 2011), decreasing an individual’s ability to focus on other tasks and leading to decreases in performance (Porath & Erez, 2009).

While it is assumed that the primary behavioral outcome for the victim is turnover, empirical evidence suggests that social undermining may lead to a spiral of aggression. For example, during this sense making process victims may attribute specific motives to the underminer’s behavior (Bradfield & Aquino, 1999). Crossley (2009) found that attributions of greed and malice lead to retaliatory and/or avoidant behavior. Lee,

Kim, Bhave, and Duffy (2016) surveyed employees and found that, following experiences of undermining, victims engaged in moral disengagement which promoted their own enactment of social undermining.

2.1.3 WITNESS’ PERSPECTIVE

Hershcovis points out that the current conceptualization of social undermining implicitly assumes that social undermining influences the witness. Rather than assuming undermining behaviors influences the attitudes and behaviors of witnesses, Hershcovis

(2011) suggests that undermining behaviors “should be examined empirically using research methods appropriate to the question (i.e., investigating the third-party observer rather than the victim)” (p. 505). In the case of social undermining behaviors such as sabotage, the witness is influenced indirectly through observations of the victim’s performance. However, in cases of damaging comments and negative gossip, the witness becomes the direct target of the social undermining behavior. Thus, social undermining works not only through the direct antagonistic relationship between the underminer and the victim, but through the social fabric that these two actors work. Inherently, this social fabric consists of the witness. It is important, then, to focus in on these behaviors (i.e.,

8 damaging comments and negative gossip), as they emphasize the unique process of social influence that differentiates social undermining from other forms of aggression.

2.1.4

The current state of the social undermining literature is primarily due to lack of construct clarity. The initial definition of social undermining (Duffy et al., 2002, 2006) specified three defining features of undermining behavior. First, social undermining is an intentional behavior. When discussing antecedents, researchers interpret intentionality to suggest that the underminer knowingly engages in undermining behavior designed to achieve self-serving (e.g., Yu, Duffy, & Tepper, 2018). When discussing outcomes, researchers interpret intentionality to suggest that the victim must attribute the behavior to the underminer and not the circumstance (e.g., Crossley, 2009). These two streams have developed in parallel within the social undermining literature. Insights into the dynamic process of social undermining within the social context of the workplace have stagnated due to the separation between underminer-perceived and victim-perceived social undermining.

Second, social undermining is defined as a repeated, low-impact process that harms the victim gradually, over time. That is, social undermining is a campaign against the victim, rather than a single explicit event. Despite the longitudinal nature specified, social undermining is not studied as a dynamic process. Instead, research theorizes social undermining from a static perspective and measures social undermining as a frequency of behaviors. Such an approach ignores the accumulative effects of social undermining.

Research should clearly delineate between a single experience of social undermining and a campaign of social undermining.

9 Third, social undermining harms the victim’s reputation. This feature necessitates a third-party who experiences a change of opinion toward the target. However, to my knowledge, there is no research that considers this component of social undermining. If social undermining operates through the changing of opinions regarding the victim, then there needs to be consideration for the social influence processes occurring.

Using these basic premises have led to a literature that has been fragmented into underminer-focused motivation for social undermining and victim-focused outcomes of social undermining. And approaching social undermining with these unstated assumption overlooks the direct and cumulative influence on the witness.

2.2 SOCIAL INFLUENCE

Social influence theories began with (French, 1956) theory of social power, which proposed a model describing interpersonal influence opinion formation. Friedkin and

Johnsen (1999) built upon this theory, integrating psychological work on opinion formation with sociological work on network effects, to model the flows of interpersonal influence within a social network. This work developed into the social influence network theory (Friedkin, 1998), which outlines the process by which an actor’s established opinion may be changed by the opinions of others within their network. While social influence network theory popularized the idea that influence flows from one individual to another and that the strength of influence is based on individual and relationship factors, social influence network theory lacks explanatory power regarding the actual process of social influence.

Ferris, Anthony, Kolodinsky, Gilmore, and Harvey (2002) sought to address the black box of the social influence process by breaking social influence into three mutually

10 influential components: the actor, the behaviors, and the mechanism. Ferris et al. (2002) classified these categories as the “who,” “what,” and “how” of social influence. The social influence actor is most often conceptualized as a role within a social network

(Halevy, Halali, & Zlatev, 2019). Indeed, social influence theories assume that any individual can fulfil this role when their goals require the support of others. While in the role, an actor will utilize a broad array of behaviors (e.g., , influence tactics, and political behavior) in an attempt to change another’s opinion or attitude and accomplish specific goals (Hogan & Blickle, 2013). Individual differences – such as personality (Caldwell & Burger, 1998), gender (Dubrin, 1991), age (Erber &

Prager, 2000), and motivation (Grams & Rogers, 1990) – shape the specific choice of behaviors employed by the actor. While the “who” and “what” are comparatively easy questions to answer, the “how” has proven to be difficult. Multiple theories have been developed to explore the social influence process, such as the elaboration likelihood model of (ELM; Petty & Cacioppo, 1986) and, most recently, the Changing

Others’ Relationship (COR) framework (Halevy et al., 2019), to name a few.

2.2.1 ELM

Elaboration likelihood model of persuasion (ELM) examines the processes that drive attitude change (Petty & Cacioppo, 1986). These processes occur through the two systems of cognition described as the central route and the peripheral route. The central route deals with critical thought processes regarding information germane to the message whereas the peripheral route deals with low-effort subjective evaluations of the message

(Petty & Cacioppo, 1986; Petty, Cacioppo, Strathman, & Priester, 2005). ELM suggests that elaboration occurs on a continuum, with the extent to which an individual engages in

11 elaboration determined by her or his ability and motivation to assess merits of the message (Petty, Wegener, & Fabrigar, 1997). Ability typically refers to an individual’s knowledge of the topic of the message (Bhattacherjee & Sanford, 2006) while motivation typically refers to personal relevance of the message, which may be influenced by peripheral cues (Petty & Cacioppo, 1986). While ELM is predominantly used in the marketing literature, it has been widely applied in the management field as a means to help describe how entrepreneurs persuade backers (Li, Chen, Kotha, & Fisher, 2017), the information processing associated with justice cognitions (Takeuchi, Chen, & Cheung,

2012), and how individuals form opinions regarding HR practices such as affirmative action (White, Charles, & Nelson, 2008). Within the workplace aggression literature, specifically, Douglas et al. (2008) utilized ELM as a framework for understanding the cognitive, emotional, and evaluative processes associated with workplace aggression, which suggests that individuals will vary in the degree to which they engage in deliberate and mindful processing following an aggression-triggering event.

Unique to ELM is the concept that social factors – such as perceptions of an influencer’s prestige, confidence, and physical attraction – influence the expenditure of cognitive effort toward understanding social influence messages (Petty & Cacioppo,

1986). That is, there are social factors that encourage individuals to pay more or less attention to understanding social influence messaging, making them more or less likely to accept social influence. While ELM provides a broad theoretical framework for understanding social influence, it is not specific to understanding how individuals influence each other’s relationships.

12 2.2.2 COR FRAMEWORK

The changing others relationships (COR; Halevy et al., 2019)) framework integrates theory and research on the social role of the broker – an actor in a social structure who influences the relationship between a dyad (Gould & Fernandez, 1989;

Simmel, 1950) – and the social process of brokering – the social influence process

(Obstfeld, Borgatti, & Davis, 2014; Quintane & Carnabuci, 2016). The COR suggests that humans regulate not only their own social interactions, but also the social interactions between others. That is, an individual within a triad can act to either strengthen or weaken the social ties between the other two members of the triad through social influence. Social influence research demonstrates that brokers may help integrate knowledge across employees (Grigoriou & Rothaermel, 2014), facilitate interactions

(Lingo & O’Mahony, 2010), and motivate cooperative behavior (Nakashima, Halali, &

Halevy, 2017). However, social influence research also demonstrates that brokers can create work environments that undercut subordinate’s opportunities to communicate and cooperate with others (Case & Maner, 2014), spread negative gossip to promote ostracism of a target (Kniffin & Wilson, 2005), and promote fear and distrust between employees (Dundon, 2002).

Thus, the COR suggests that there are two aspects of brokering: (a) the ability to create or break the relationship between a dyad and (b) the ability to flip the sign of the relationship (positive-to-negative or negative-to-positive) between a dyad. That is, the basic role of the broker is to shape the relationship between others. The broker can create and/or support positive relationships (e.g., (Grigoriou & Rothaermel, 2014; Lingo &

O’Mahony, 2010; Nakashima et al., 2017), mediate negative relationships to create

13 neutral or positive relationships (e.g., Kaplan, Milde, & Cowan, 2017; Obstfeld, 2017), or undermine relationships (e.g., (Case & Maner, 2014; Dundon, 2002; Kniffin & Wilson,

2005; Posner, Spier, & Vermeule, 2010). Specifically, the COR proposes three forms of brokers: (a) the helpful broker, who strengthens the relationship between two others, (b) the reinforcer, who acts as a conduit to transfer information in the network, and (c) the harmful broker, who weakens the relationship between two others.

The broker creates these changes in the relationship of others through activities such as providing introductions or acting as a liaison (Soda, Tortoriello, & Iorio, 2018), acting as a mediator during conflict (Lewicki & Sheppard, 1985; Shapiro & Brett, 1993), incentivize cooperation through resource control (i.e., Halevy et al., 2019; Nakashima et al., 2017), or spreading gossip (Ellwardt, Labianca, & Wittek, 2012; Kniffin & Wilson,

2005), to name a few. The COR ultimately suggests that influence occurs through information control (e.g., advice, feedback, and gossip) or incentives (e.g., , rewards/punishments, and social inclusion/exclusion) and is used to achieve a specific goal.

Unlike other theories on social influence, the COR is explicitly designed to explain how an individual shapes the relationship between two others. It integrates many current theories to illuminate the underlying psychological and sociological mechanisms that allow this shaping to occur, and helps to explain why individuals are relatively conducive to this form of social influence operating within their network. Therefore, the

COR provides the primary social influence framework for understanding social undermining. The social underminer is a harmful broker who engages in behavioral actions designed to damage the relationship between the witness and the victim. While

14 the underminer may be motivated by either envy (Duffy et al., 2012; Dunn & Schweitzer,

2006; Reh et al., 2018) or bottom-line mentality (Greenbaum et al., 2012; Reh et al.,

2018), the goal of the underminer is to remove a potential competitor. Thus, the underminer engages in behavior designed to negatively modify the relationship between the witness and the victim. While social influence helps to clarify social undermining as a phenomelogical event, determining the ultimate witness response will require the integration of theory regarding how individuals understand events.

2.3 EMOTIONS

Emotions, especially negative emotions, provide a guiding mechanism through which individuals understand and respond to events (Roseman, Wiest, & Swartz, 1994) and come to understand their workplace. Specifically, emotions help an individual to understand their experiences at work. Therefore, research on emotions will provide insight into how the witness comes to make sense of a social undermining event. Through the integration of social influence (ELM and COR) into social undermining, it becomes apparent that the witness may accept or reject attempts at social undermining. Either option creates a discrete workplace event that will elicit unique emotional response.

Below I provide an overview of the research on emotions in order to provide insight into the likely emotions experienced by the witness following the experience of social influence. I start with a brief summary of the use of emotions research within the management field. I then provide a brief overview of affective events theory as a means of tying together the emotions research into a useful theoretical framework. Finally, I focus the discussion on the three discrete emotions of contempt, anger, and fear, as they are the primary emotions theoretically related to social undermining.

15 2.3.1 EMOTIONS IN THE MANAGEMENT LITERATURE

Affect is a short-term experience of feeling states encompassing hedonistic

(pleasure/pain) appraisals and intensity (e.g., Ekman, 1992; Frijda, 1986). Affect is comprised of two types of states, moods and emotions. Moods are a diffuse, general feeling of positivity (pleasant) or negativity (unpleasant) that is not necessarily linked to a specific event (Barsade & Gibson, 2007). Moods arise from low-intensity stimuli and/or non-salient antecedents (Cropanzano, Weiss, Hale, & Reb, 2003; Elfenbein, 2007). Thus, moods are an enduring state, but of low intensity (Frijda, 1986; Tellegen, 1985).

Emotions, on the other hand, are unique feelings (both cognitive and physiological) that are elicited by a specific cause (Frijda, 1986; Lazarus, 1991) and prompt specific actions

(Ekman, 1992). Emotions act as a signal to an individual to adapt to her or his current environment (Schwarz & Clore, 2003): positive emotions helping to encourage well- being and negative emotions suggesting a stressor exists that needs to be resolved.

Therefore, while emotions can be related to one another, each emotion is its own discrete state (e.g., anger, fear, and contempt) with specific antecedents and consequences

(Ekman, 1992; Elfenbein, 2007).

The workplace provides ample opportunity for emotion eliciting events (Basch &

Fisher, 2000), such as conflicting role demands (Williams, Suls, Alliger, Learner, &

Wan, 1991), cognitive strain (Bodrov, 2000), and time pressure (Baber, Mellor, Graham,

Noyes, & Tunley, 1996). Izard (1993) suggested that such emotion eliciting events activate learned “scripts” constituting specific behavioral, cognitive, and emotional reactions. In this way, responses to emotion eliciting events are automated such that evaluative cognition is bypassed in favor of the less effortful emotional response. Forgas

16 (1995; Forgas & George, 2001) label this phenomena as “affect infusion,” wherein individuals tend to rely on emotion and their associated heuristics when engaged in substantive cognitive processing. For example, it is believed that positive emotions prompt optimistic situational appraisals that promote greater risk taking (Ashton-James &

Ashkanasy, 2005). Supporting this proposition, a study of decision makers found evidence that positive emotions were related to higher risk taking under conditions of uncertainty (Mittal & Ross, 1998).

Theory and empirical work suggest that relational characteristics shape an individual’s emotional response to an event. Lazarus (1991; Lazarus & Lazarus, 1994) proposes that a prominent determinant of the specific emotion experienced in any given situation is the relationship that an individual has to others involved in the event (see also

Shweder, 1993). Using autobiographical recall and vignettes, Fischer and Roseman

(2007) explored how relationship factors may influence the feelings of contempt following a breach. The authors found that feelings of contempt is moderated by the strength (i.e., intimacy) of the relationship between the trustor and trustee.

2.3.1.1 AFFECTIVE EVENTS THEORY

Weiss and Cropanzano's (1996) affective events theory (AET) draws heavily from the empirical and theoretical work on emotions overviewed above to provide a comprehensive theoretical framework for understanding the relationship between workplace events and emotional responses. AET posits that experiencing daily events prompts affective responses. Over time, the accumulation of affective responses to specific events will shape an individual’s perceptions and judgments, such as work attitudes, and performance-related behaviors (Weiss & Beal, 2005). Weiss and

17 Cropanzano do not specify what constitutes an event, nor the corresponding emotions experienced; however, there is a growing literature regarding the impact of discrete events in the workplace. In the deviance literature, for instance, empirical evidence has explored the damaging effects of bullying on feelings of anger, , fear and distress

(Ayoko, Callan, & Härtel, 2003; Tracy, Lutgen-Sandvik, & Alberts, 2006) and subsequently power imbalance and group membership change (Salin, 2003), interpersonal conflict (Hauge, Skogstad, & Einarsen, 2009) and satisfaction and turnover intentions (Glasø, Vie, Holmdal, & Einarsen, 2011).

AET provides a framework for understanding the confluence of events and emotions in shaping an individual’s perception of their workplace environment (Ashton-

James & Ashkanasy, 2005; Basch & Fisher, 2000). Similar to the ideas proposed by Izard

(1993), AET suggests that emotions help to prompt learned behavioral scripts and help reduce the cognitive effort for sense-making. As such, Many phenomena at work are influenced by affective events, including relationship development (e.g., leader-member exchange; Cropanzano, Dasborough, & Weiss, 2017) and identity management (Mohr et al., 2019), employees reactions to human resource management policies and practices

(Chacko & Conway, 2019), and affect contagion (e.g., from subordinate to supervisor;

(Lanaj & Jennings, 2019). Additionally, affect is believed to influence how individuals process information such that individuals in a positive mood rely more on heuristic processing (Bodenhausen, Kramer, & Susser, 1994) while individuals in a negative mood rely more on cognitive processing (Lerner & Keltner, 2001). Thus, AET provides a useful theoretical framework for combining research the role of emotions as a mediator between eliciting events and behaviors.

18 2.3.2 ROLE OF EMOTIONS IN SOCIAL UNDERMINING

In conceptualizing social undermining as social influence, we can conceptualize the social undermining campaign as consisting of discrete social undermining event that elicits a unique emotion. Indeed, due to its pernicious nature, social undermining may be considered a relatively common emotion-eliciting event in the workplace. I propose three emotions that would be most likely to emerge in response to social undermining: contempt, anger, and fear. If social undermining is accepted, the witness is likely to experience contempt for the victim. When the witness is persuaded by the underminer, the victim appears comparatively inferior relative to the social group (e.g., Greenbaum et al., 2012, 2015), prompting contempt. Contempt can lead to disassociation with, and ostricization of, the target (Keltner & Haidt, 1999), which serves the goals of the underminer. If social undermining is rejected, the witness is likely to perceive the social undermining as an attempt to degrade the victim. When the witness is not persuaded by the underminer, the underminer is likely to appear to have breached interpersonal justice norms (e.g., Cortina & Magley, 2003), prompting negative affect toward the underminer.

Dependent on contextual factors that limit perceptions of situational control (e.g., power;

Hareli & Rafaeli, 2008), this negative affect can manifest as feelings of anger or fear.

Anger can lead to behaviors designed to punish the target (Dubreuil, 2010; Fitness,

2000). On the other hand, fear can lead to avoidance or appeasement behaviors (Lerner &

Keltner, 2001; Mackie, Devos, & Smith, 2000).

2.3.2.1 CONTEMPT

Contempt is defined as a negative emotion that conveys a disregard for another

(Fischer & Roseman, 2007; Morris & Keltner, 2000). Contempt is believed to be a

19 discrete emotion that reflects a negative of an individual (Frijda, 2007) and is defined by an absence of respect toward another individual (Gervais & Fessler, 2017).

Contempt is often classified as a “cool” (rather than “hot”) emotion (Izard, 1993), as it shapes appraisals of an other’s character or competence following a transgression (Rozin,

Lowery, Imada, & Haidt, 1999).

Being a “cool” emotion, contempt promotes avoidant tendencies, prompting exclusion. Contempt may act to diminish interactions with individuals deemed incompetent or unworthy. Specifically, contempt promotes the exclusion of the targeted individual from one’s social network (Mackie et al., 2000; Roseman, Copeland, &

Fischer, 2003; Roseman et al., 1994). Contempt may be a longer-lasting emotion than most of the discrete emotions, leading to negative and durable changes in beliefs regarding another person (Frijda & Mesquita, 1994). Therefore, feelings of contempt are likely to drastically change the witness’s perceptions of the victim’s ability to contribute to the group in any meaningful way and prompt ostracism behaviors. At greater intensities, contempt may prompt individuals to engage in behaviors that directly harm the target as a means to increase social separation from the target (Dubreuil, 2010). As the goal of the underminer is to damage the reputation of the victim, both sets of behaviors (i.e., ostracism and direct harm) are conducive to the goals of the underminer.

2.3.2.2 ANGER

Anger is defined as a negative emotion that signals the frustration of a goal (Ekman,

2006). Anger is elicited in situations where the individual can attribute to a specific entity for wrong-doing (i.e., person, group, or ) while at the same time the individual has a high degree of perceived control to address the situation

20 (Lazarus, 1991; Lazarus & Folkman, 1984). From this description, there are three components that facilitate the experience of anger. First, the situation must be one that creates a sense of unfairness (Lebel, 2017; Roseman et al., 1994). Second, the situation must provide a target for the emotion, in that anger involves a cognitive attribution of blame to a specific entity (Roseman, 2013). Finally, the situation must be one that allows for a sense of control such that the individual feels able to act in opposition to the target of the anger (Averill, 1973; Frijda, Kuipers, & ter Schure, 1989; Morris & Keltner, 2000;

Roseman et al., 1994). Supporting the necessary eliciting components of anger, Kuppens,

Van Mechelen, Smits, and De Boeck (2003) asked participants to recall a recent unpleasant situation to determine which situational factors contribute to feelings of anger.

They found that, while other and perceptions of arrogant entitlement are specific factors that promote feelings of anger, no single component was necessary or sufficient alone.

Anger is typically associated with negative approach (fight) behaviors (Cannon,

1935; Frijda, 2009). More specifically, anger is believed to promote aggression toward a target, prompting conflict (Adler, Rosen, & Silverstein, 1998), blame (Aquino, Tripp, &

Bies, 2001), and revenge (Tripp & Bies, 1997). Anger is also theorized to motivate the actor toward achievement of goals (Izard, 1993; Keltner & Gross, 1999), leading to positive outcomes for the actor (Tafrate, Kassinove, & Dundin, 2002). Empirical work in the negotiations literature suggests that anger may help focus an individual on key topics and achieve self-serving outcomes during negotiations (Friedman et al., 2004; Van Kleef

& Côté, 2007; Van Kleef, De Dreu, & Manstead, 2004). Thus, anger prompts individuals to act in a way that achieves their goals. A witness who experiences anger will likely act

21 against the underminer, as within the social undermining context the underminer has committed a normative transgression.

2.3.2.3 FEAR

Fear is defined as a negative emotion that signals ongoing threat to important goals (Lazarus, 1991). Fear is experienced in response to a threat (Frijda, 2007; Lazarus,

1991) when individuals perceives low situational control (Ellsworth & Scherer, 2003;

Reeve, 2014; Roseman, 2013). That is, fear is focused on protecting the self (Haidt,

2003). Fear may be felt vicariously when witnessing another experience a threat only as long as there is a strong identification with the other (Keltner & Haidt, 1999).

As a universally experienced emotion, fear is believed to promote self-protecting behaviors (Lazarus & Folkman, 1984); more commonly described as “void (flight) behaviors (Frijda, 1986, 2009, 2010). Indeed, seminal empirical work on emotions suggests fear is positively related to inhibition and avoidance behaviors (e.g., Frijda et al.,

1989). For example, utilizing a recall task across 100 subjects, Roseman et al. (1994) found that fear was strongly correlated with “running away” and “requests for help” (r =

.67 and .42, respectively). Similarly, Leventhal (1970) suggested that fear prompts behaviors associated with psychological processes of “fear-control” – the downplaying or of the threat – or “danger-control” – the cognitive evaluation of the threat and potential actions. Leventhal (1971) proposes that the degree to which an individual engages in “fear-control” versus “danger-control” may be determined by factors associated with situational control, such as self-esteem. Rogers (1975) furthered

Leventhal’s work, developing the protection motivation theory, which suggests fear directs threat and coping appraisals and culminates into protection directed motivations.

22 When individuals feel ill equipped to cope with a given situation, fear is experienced and the individual is thus encouraged to engage in behaviors designed to protect the self.

Indeed, Fitness (2000) found that employees who fear retribution from an abusive supervisor will engage in avoidance behaviors. Similarly, Kiewitz, Restubog, Shoss,

Garcia, and Tang (2016) found that fear of supervisor was positively related to . Conversely, fear can prompt individuals to act to preserve their own safety. For example, Keltner, Young, & Buswell (1997) reviewed the empirical research on appeasement and found that, in cases where there is a heightened sense of potential conflict or aggression, fear prompts behaviors designed to show submission to the target of fear. In the context of social undermining, a fearful witness is likely to either withdraw from the victim or to otherwise behave in harmful behaviors toward the victim as a means of self-preservation.

2.4 THE SOCIAL INFLUENCE FRAMEWORK OF SOCIAL UNDERMINING

“Social life is constantly determined in its course by the

presence of the third person” (Simmel, 1950: p.149)

Conceptualizing social undermining as a social influence process helps integrate the current state of the social undermining literature and promote a better understanding of the underlying mechanisms that allow social undermining to proliferate in . Therefore, I integrate theory and research on social undermining (e.g.,

Duffy et al., 2002, 2006) with the theory of social influence – changing others’ relationship (COR; Halevy, Halali, & Zlatev, 2019) – and emotions – affective events theory (AET; Weiss & Cropanzano, 1996) – to propose a theoretical framework for understanding social undermining as a form of social influence operating on the witness.

23 This framework is presented in Figure 2.1 below. While reviewing the social influence framework of social undermining model, it is important to keep in mind that social undermining should be understood as a triadic-level phenomenon. That is, social undermining is a phenomenon that requires three actors – the underminer, the victim, and the witness. Social undermining operates within the context of this triadic relationship.

The development of a social influence framework of social undermining will make four contributions. First, it will provide clarity surrounding the social undermining construct. By shifting the frame from the victim and underminer to the witness, the social influence framework of social undermining allows for understanding how social undermining behaviors are signals that are interpreted by the witness. That is to say, social undermining behaviors prompt responses from the witness, but those responses may not be directed at the victim. Second, a social influence framework will provide a method that links the underminer-focused research and the victim-focused research within a single conceptual framework. The social influence process is the lynch pin between the motivated actions of undermining and the negative consequences to the victim by clarifying when undermining, through witness response, adversely affects the victim. Third, a social influence framework of social undermining will illuminate the reason why social undermining differs from other forms of workplace aggression by highlighting the essential role of the witness. Whereas other forms of workplace aggression involve direct interaction between the aggressor and the victim, undermining behavior, with its focus on reputation, harms the victim through its impact on the witness

(Hershcovis, 2011; Yoo, 2013). Finally, a social influence framework of social undermining will allow research to approach social undermining through a dynamic lens.

24 By conceptualizing social undermining as a series of social influence events, research can examine the formation and change of emotions and attitudes toward both the victim and the underminer.

In the following sections, I will outline the social influence framework of social undermining. First, I will discuss the psychological processes involved in a singular social influence event, as presented in figure 2.1. Then, I will extend the event-based perspective by considering social undermining as an episodic interaction between the witness and the underminer and victim.

2.4.1 SOCIAL UNDERMINING AS AN EVENT

As indicated in the literature review above, not much is known in the social undermining literature regarding the interaction between the underminer and the witness besides it being a necessary condition of social undermining (Hershcovis, 2011).

However, the social influence literature provides some insight into the mechanisms underlying this relationship. Individuals seek knowledge of a coworker’s performance trajectory in order to identify potential rivals and, in competitive environments, will undermine those they have identified as potential rivals, regardless of their current performance (Reh et al., 2018). Indeed, Simmel (1955: p. 30) notes, “it is usually much easier for the average person to inspire another individual with distrust and suspicion toward a third… than with confidence and sympathy”). While social undermining has not been directly studied in the social influence literature, behaviors comprising social undermining have.

Gossip is a particularly common, yet complex, social behavior (Dunbar, 2004;

Giardini, 2012). As such, it has been of unique interest in the field of sociology. And, as

25 negative workplace gossip (henceforth referred simply as gossip) is a subcomponent of social undermining, understanding gossip is advantageous to understanding social undermining as social influence. Gossip is a social phenomenon that influences affect, cognition, and behavior (“hearts, minds, and deeds”) of individuals (Baumeister, Zhang,

& Vohs, 2004; Beersma & Van Kleef, 2012). Gossip occurs when one individual engages in informal and evaluative communication with another about an absent third individual

(Kurland & Pelled, 2000). Gossip is also believed to provide a group-regulatory function which allows for the identification of individuals who are not contributing Dunbar

(2004). Kniffin and Wilson (2005) state that “the degree of common fate shared by a group’s members influences the degree to which gossip is used as an instrument of social control.” As such, there is social acceptability surrounding gossip to identify poor performers.

I propose that social influence process of social undermining works within the same processes as gossip. However, social undermining is motivated toward a specific goal, whereas the goals of gossip are more diffuse. The underminer attempts to influence the witness’ perception regarding the victim through sharing negative statements regarding the victim. The witness is apt to believe the underminer due to the use of gossip as a key social regulatory process. Thus, the underminer is able to prompt small shifts and shape the relationship between the witness and the victim, all the while acting as a confidant.

I propose that this social influence process unfolds in a two-stage model. The first stage is the witness sense making following an underminer’s attempt at influence. The underminer may intentionally use damaging comments or negative gossip behaviors

26 regarding a victim in order to try to shape the opinions of the witness. The witness, in turn, makes sense of the comments or gossip, incorporating relevant social information to determine whether to accept or reject the influence of the underminer. As individuals tend to enter into interactions with a general expectancy of trustworthiness (Jones & Shah,

2016), the witness may be predisposed to engage in low levels of cognitive elaboration when they are engaged in this sense-making process. An example of the negative effects of this predisposition towards trust is exemplified in the construct of “over-trust,” wherein an individual trusts more than the situation actually warrants and, subsequently, is more lenient in judging a partner and experiences delay in perceiving exploitation

(Goel, Bell, & Pierce, 2005). Conversely, social undermining is different from other forms of persuasion because, by definition, it is a malicious action (Duffy et al., 2002).

Underminers engage in undermining with the intention to damage the victim (Duffy et al., 2012), and individuals are more or less sensitive to such actions (Folger, 1987).

The second stage encompasses the witness emotional and behavioral response. As contempt reflects a negative evaluation of an individual (Frijda, 2007), it is likely that the witness will experience contempt when they are influenced by the underminer. Feelings of contempt toward the victim will promote witnesses to engage in behaviors that support the goals of the underminer, such as socially excluding the victim. Conversely, the witness is likely to experience anger or fear toward the underminer upon experiencing a negative attribution change toward the underminer. Feelings of anger toward the underminer may promote the witness to engage in retribution behaviors, such as lodging a formal complaint or reprimanding the underminer. Feelings of fear toward an

27 underminer may promote withdrawal and inhibition behavior, such as avoiding the underminer and remaining silent.

2.4.1.1 OUTCOMES

When the witness accepts social undermining, they are likely to follow the path of contempt and build social difference with the victim. This outcome will lead to the current findings regarding victim outcomes within the social undermining literature.

However, the social influence framework of social undermining allows the witness to reject social undermining, leading down the paths of anger and/or fear.

To my knowledge, there is no research on how witnesses respond to social undermining. However, work has looked at how individuals cope with stressful situations. Lazarus and Folkman (1984) proposed the transaction model of stress that outlines two potential coping strategies. Problem-focused coping suggests that one can respond to stress by either changing the situation to eliminate the source of stress (e.g., taking direct action, seeking support) or changing one’s view of the situation (e.g., positive reappraisal). Emotion-focused coping suggest that one can respond to stress through emotional control through humor (Hogh & Dofradottir, 2001; Keashly, Trott, &

MacLean, 1994), emotional regulation (Grandey, Dickter, & , 2004) or forgiveness

(Aquino, Tripp, & Bies, 2006; Hallberg & Strandmark, 2006; Struthers, Dupuis, & Eaton,

2005).

Additionally, the justice literature provides some insight into potential witness responses. Upon witnessing a breach of justice, individuals are motivated to alter the behavior of the transgressor through and demonstrate a willingness to prevent further mistreatment (Glomb, 2002; R. Lee & Brotheridge, 2006). Thus,

28 retaliatory aggression is commonly viewed to be a legitimate and/or morally appropriate response to victimization (Tripp, Bies, & Aquino, 2002; Zapf & Gross, 2001) and has been found to be a common strategy (e.g., (Dupré, Inness, Connelly, Barling, & Hoption,

2006; Mitchell & Ambrose, 2007; Tepper, Duffy, & Shaw, 2001). Several studies found moderating factors that indicate that retaliatory aggression may spread out to become aggression toward coworkers (e.g., Aquino & Douglas, 2003; Jockin, Arvey, & McGue,

2001). Conversely, witnesses may engage in “escape responses” – quitting or transferring; Tepper, 2000; Zapf & Gross, 2001), being absent from work (Kivimäki et al., 2003; Zapf, Knorz, & Kulla, 1996), or avoiding/ignoring the perpetrator (Keashly et al., 1994).

In exploring how to alleviate the negative outcomes for the victim, the workplace aggression literature has highlighted a few potential witness responses. Research has found that support from coworkers and supervisors following victimization may reduce negative psychological consequences (Schat & Kelloway, 2003). Qualitative research suggests that a lack of support from colleagues following victimization decreases an employee’s ability to defend themselves against an aggressor and increases feelings of isolation, vulnerability, and diminishes feelings of self-worth (Lewis & Orford, 2005).

These studies suggest that witnesses may sometimes engage in supporting behaviors.

However, research suggests that there is a cost to standing up to an aggressor. In studying , Cortina & Magley (2003) found that enactment of active behaviors (e.g., confronting an aggressor) may lead to work-retaliation victimization such as discharge, demotion, or involuntary transfer and that the use of voice (e.g., seeking social support from others or whistle blowing) may lead to social-retaliation victimization

29 such as ostracism and threats. Thus, the witness who stands up may become the next victim.

2.4.1.2 SOCIAL CONTEXT FACTORS

The role of the social environment influences the interpretation of behaviors as workplace aggression. For example, work environments that are stressful and competitive

(Vartia, 1996), possess high levels of (Einarsen, Raknes, & Matthiesen,

1994; Skogstad, Einarsen, Torsheim, Aasland, & Hetland, 2007) and role ambiguity

(Agervold & Mikkelsen, 2004; Jennifer, Cowie, & Ananiadou, 2003; Quine, 2001), contain a large number of employees (Einarsen & Skogstad, 1996) working interdependently (Zapf, 1999) contribute to the perceptions of behaviors as aggressive.

As suggested by the social influence theories, interaction patterns between individuals also appear to influence the identification of behaviors as aggression. Authoritarian leadership styles foster perceptions of victimization (Einarsen et al., 1994; Hallberg &

Strandmark, 2006). On the other end of the spectrum, “hands-off”/laissez-faire styles of leadership also positively relate to perceptions of victimization (Skogstad et al., 2007).

Within the context of social undermining, I propose two key social context factors that will shape the social influence framework of social undermining. First, the relationship between the witness and the other two actors within the social undermining triad is likely to influence the first stage of the witness sense-making process. A strong relationship helps fulfil various psychological and sociological needs (Ashforth, 2001) and is more likely to be sought after and protected (Aron & Aron, 2000). Thus, positive relational factors between the witness and the underminer will predispose the witness to be more accepting of the social influence attempt. Conversely, positive relational factors

30 between the witness and the victim will predispose the witness to be less accepting of the social influence attempt. Second, relative power between the underminer and the witness will be an important constraint on the witness’ behavioral outcome (McAllister, Ellen, &

Ferris, 2018). An underminer is not likely to engage in influence unless they perceive themselves as having power in the situation. Therefore, it is likely that underminer power will moderate the response pattern of the witness. Under conditions where the underminer is perceived to have low power, the witness may respond with retribution behaviors directed at the underminer.

2.4.2 SOCIAL UNDERMINING AS A CAMPAIGN

Social undermining does not occur occasionally. Rather, it is a series of discrete events that all work toward the desired goal of the underminer: damage the victim’s reputation. Thus, it is important to consider how each discrete social undermining event builds upon previous events to shape the witness’ opinion and perceptions of the victim. I propose that social undermining as a campaign works through self-reinforcing cycles of the discrete events described above. Social influence suggest that repeated messages serve to change an individual’s opinions and perceptions, even when any single event may not be persuasive on its own (Cacioppo & Petty, 1979; DeMarzo, Vayanos, &

Zwiebel, 2003). At the same time, research into gossip suggests that sharing information regarding a third-party serves to strengthen the relationship between over time

(Dunbar, 2004). Thus, repeated social undermining events should operate to slowly reinforce acceptance of the social undermining message. Similarly, repeated social undermining events may serve to automate emotion scripts. Such emotion scripts make it easier for individuals to experience certain emotions in similar contexts (Izard, 1993) and

31 prompts individuals to think and behave in specific patterns (Forgas & George, 2001).

Therefore, social undermining works through slow escalation, causing minor changes in the attitudes and behaviors of the witness that slowly build upon themselves over time.

By taking a dynamic-event based view, it is apparent that there are two questions that must be answered in order to understand how and why social undermining works.

The first question is “how does a witness respond to a single social undermining event?”

More specifically, it is important to understand the social factors that promote the acceptance or rejection of the social undermining influence attempt. The second question is “how does a campaign of social undermining events work to change the witness’ attitude and behavior?” It is important to explore how the social factors that influence the witness response to social undermining establishes a trend of attitude and behavior change. In the next two chapters of this dissertation, I propose and test the event-based view of social undermining (Chapter 2) and the campaign-based view of social undermining (Chapter 3).

32

Social Context Behavior Harming Factors Contempt toward the Victim Victim Withdrawal from Victim Perceptions of Victim

Social Anger toward Retaliation toward Undermining Event Underminer Underminer

33 Perceptions of

Underminer Behavior

Appeasing the

Underminer Fear

Withdrawal from Victim

Figure 2.1 Social Influence Framework of Social Undermining

CHAPTER 3

STUDY 1: SOCIAL UNDERMINING AS AN EVENT

The primary purpose of this chapter is to uncover the role of the witness in the social undermining phenomena. That is, this chapter seeks to answer the question: under what conditions a witness accepts the social influence of the social underminer – and responds in a manner that is conducive to the underminer’s goal – and under what conditions a witness rejects the social influence of the social underminer – and responds in a manner that is counter to the underminer’s goal. Through the integration of the

Changing Other’s Relationship (COR) framework (Halevy et al., 2019) and affective events theory (AET; Weiss & Cropanzano, 1996), I build hypotheses regarding the social factors that shape the witness sense-making process in response to social undermining.

Specifically, I build theory to reconceptualize social undermining as a series of social influence events. Additionally, I explore the influence of emotions in the witness response to the social influence events of social undermining. AET suggests that emotions play a key role in determining how individuals respond to events within the workplace. The confluence of emotions and social factors should direct the witness’ attitudinal and behavioral response.

In this chapter, I build a witness model of social undermining to suggest that a social influence event of social undermining prompts an immediate emotional response that prompts further cognitive and behavioral responses. This approach allows me to highlight factors that influence a witness’ response to the social influence of the

34

underminer. Additionally, this approach allows for the identification of factors that may cause social undermining to “backfire” on the underminer. That is, by exploring a single event, it is possible to work out the social influence mechanisms that allow the witness to be more or less susceptible to social undermining. The balance of this chapter develops theory outlining the psychological processes associated with a witness’ interpretation and response to social undermining and the moderating role of power within the social network. This chapter ends with a study of 100 working professionals that finds evidence suggesting social undermining elicits discrete emotions that prompt specific behaviors directed at supporting the underminer or attacking the underminer.

3.1 WITNESS MODEL OF SOCIAL UNDERMINING

Recall that the social underminer is a harmful broker. According to the definition, the goal of the underminer is to weaken a target’s relationships (Duffy et al., 2002). The social underminer does this through activities such as gossip and social isolation of the target. Indeed, the COR provides an explanation for why an individual chooses social undermining as opposed to the many other behavioral options they have available. Under the COR framework, the underminer possess the means (social influence), motive (envy / bottom line mentality), and opportunity (position in the social network) to engage in social undermining. Specifically, as a harmful broker, the underminer sends a message to the witness with the goal being to change the witness’ perceptions of the victim.

However, the COR suggests that the witness undergoes the process of message decoding as illuminated in (Friedkin, 1998, 2003) social influence theory. That is, the witness receives and interprets the message from the underminer and, subsequently, experiences emotional, cognitive, and behavioral change.

35

The sense-making that occurs during this social influence process is influenced by the social context (Halevy et al., 2019; Petty & Cacioppo, 1986). As social undermining is a triadic-level phenomenon, the relationship that the witness has with the underminer and the victim will shape how the witness makes sense of the social influence messages from the underminer. Thus, a key factor in determining how social undermining plays out is the push/pull dynamic established by the relationship factors associated with the underminer – which would promote accepting social undermining – and the relationship factors associated with the victim – which would promote rejecting social undermining.

3.2 RELATIONAL IDENTIFICATION

According to the COR, factors representing the social connection between actors is important in understanding social influence phenomenon (Halevy et al., 2019), such as social undermining. Indeed, many of the social influence theories, supported by social comparison theory (e.g., Festinger, 1954), suggests that individuals are strongly influenced by the attitudes and opinions of similar others. Indeed, the primary premise of social influence within the social network literature is that the degree of influence is relative to the characteristics of the influencer and the relationship between the influencer and target of influence (Friedkin, 1998). Friedkin takes the stance that social influence must provide a force to change an individual’s entrenched beliefs and opinions. This conceptualization of social influence is echoed in related theories. For example, the elaboration likelihood model of persuasion (Petty & Cacioppo, 1986) suggest that a message gains persuasive power due to central and peripheral cues operating on the dual levels of cognition. Within the COR, Halvey and colleagues integrates the social influence theories to suggest that social influence is housed within the relationship

36

between the broker (message sender) and another triad actor (message receiver). That is, a strong tie between message sender and message receiver will increase the likelihood of social influence. Conversely, a weak tie between sender and receiver will decrease the likelihood of social influence. In other words, the likelihood of successful social influence – that is, a change of opinion in the target that is conducive to the influencer’s goal – is influenced by characteristics of the target-influencer relationship.

The literature has extensively explored the influence that relationship characteristics have on the strength of influence. For example, (Larrimore, Jiang,

Larrimore, Markowitz, & Gorski, 2011) examined the peer-to-peer lending environment

(e.g., Kickstarter) and found that the quick development of trust was a significant, positive predictor of the success of funding. In an experiment that has been replicated multiple times throughout the years, Chaiken (1979) performed a field study and found evidence that attractiveness of the message sender influenced the persuasive power of messages. In testing the elaboration likelihood model of persuasion, Petty, Cacioppo, &

Goldman (1981) divided their study into high and low elaboration groups and had participants espouse a specific value, then attempt to persuade others of an idea either consistent with that value or antithetical to that value. Their results suggested that, in situations of low cognitive elaboration, an individual’s perceptions of the message sender was more influential than the content of the message alone.

Relational identification – the degree to which recurring connections between two individuals support one’s self-concept (Sluss & Ashforth, 2007) – provides an acceptable proxy for these relationship characteristics. Relational identification is built upon formal relationships (e.g., supervisor-subordinate) and informal relationships (e.g., friends; Sluss

37

& Ashforth, 2008). Such work relationships are important as they help fulfil psychological needs such as belonging and purpose (Ashforth, 2001; Hinde, 1997). Thus, relationships that meets one’s specific socio-psychological needs are more likely to be attractive and fostered (Aron & Aron, 2000) and the degree of relational identification grows. The seminal work by Sluss and Ashforth (2007) considers relational identification to be a method to capture the ability for coworkers to influence each other’s affective responses to the organization. It is believed that individuals may internalize into their self-concept those they respect and wish to emulate (Aron & Aron, 2000; Ashforth &

Mael, 1989). This internalization process leads to a haloing effect wherein a positive association is made with the relationship as well as the relevant other (Sluss & Ashforth,

2007). Therefore, an individual will come to develop a deep level of trust within the relationship (Lewicki & Bunker, 1996) and an increase in valuation of opinions and information stemming from the relationship (Sluss & Ashforth, 2008).

3.3 WITNESS EMOTIONS

Many social influence theories suggest that a social influence event is liable to produce an emotional response (e.g., Petty & Cacioppo, 1986). Integrating the COR and

AET provides some insight into how social factors (i.e., relational identification) prompts emotional responses to the experience of a social influence event of social undermining.

First, the COR suggests that social factors will be a primary predictor of the outcome of social influence. Therefore, a witness who has a relational identification with the underminer will be more likely to accept the information from the underminer as true.

Conversely, individuals discount disconfirming information regarding an individual with whom they have a strong relationship. Therefore, a witness who has a relational

38

identification with the victim will be more likely to reject the information from the underminer.

Additionally, as social undermining is designed to work below the level of overt detection (Duffy et al., 2002), the social influence event of social undermining should fail to cause cognitive elaboration (Petty et al., 2005). That is to say, the witness will incorporate the information provided by the underminer and change their evaluation of the witness. However, this change of opinion will manifest much more as a feeling than a cognitive decision. As contempt is the feeling that best reflects a negative appraisal of a targeted individual (Fischer & Giner-Sorolla, 2016), I propose that the witness will experience an increase in contempt. Additionally, as the COR suggests that successful social influence should reinforce the relationship between the engaged parties, the witness should perceive the underminer more positively after the social undermining event. Such positive appraisals will should lead to lower feelings of anger and fear toward the underminer. Therefore, I hypothesis the following:

Hypothesis 1: Following an undermining event, witness relational identification

with the underminer will be:

(a) Positively related to contempt toward the victim.

(b) Negatively related to anger toward the underminer.

(c) Negatively related to fear of the underminer.

Conversely, the COR also suggests that relational identification with the victim will influence the social influence process. Specifically, when there is a strong tie between the witness and the victim, attempts at social influence may backfire upon the underminer. This potential for social influence to fail and damage the influencer is

39

exemplified in work looking at political skill within the workplace (e.g., Harris,

Zivnuska, Kacmar, & Shaw, 2007; Wihler, Blickle, Ellen, Hochwarter, & Ferris, 2017).

As social undermining is intentional and malicious, it is likely to be viewed as an unjust experience. Empirical evidence suggests that situations that are believed to be unfair or unjust prompt negative affective responses (e.g., Folger, 1987, 1998; Greenberg, 1990;

Lazarus, 1991; Sheppard, Lewicki, & Minton, 1992). It has been proposed that the negative emotions experienced in response to justice violations are an “energizing” outcome (Skarlicki & Folger, 1997, p 4.35) such that they form a key role in understanding responses to interpersonal justice (Krehbiel & Cropanzano, 2000; Mikula,

Scherer, & Athenstaedt, 1998). The two negative affective emotional responses that are most prevalent in the workplace are anger and fear (Adler et al., 1998; Lebel, 2017;

Mackie et al., 2000). Both anger and fear are emotional responses associated with goal frustration and norm breach (Frijda, 2009), but differentiate based on perceptions of control. Anger is the predominant emotion experienced when the individual perceives high control and fear is the predominant emotion experienced when the individual perceives low control. Therefore, under situations of high relational identification with the victim, the witness is likely to experience negative emotions directed toward the underminer.

Hypothesis 2: Following an undermining event, witness relational identification

with the victim will be:

(a) Negatively related to contempt toward the victim.

(b) Positively related to anger toward the underminer.

(c) Positively related to fear.

40

3.4 WITNESS ATTITUDINAL AND BEHAVIORAL OUTCOMES

Emotions act as a source of information during sense-making and help direct attitudinal and behavioral responses (Forgas & George, 2001). AET suggests that emotions are the proximal outcome of an event and, in turn, shape cognitive processes following an event (Weiss & Cropanzano, 1996). In the context of social influence, the cognitive response directed by emotions will be reflected in changes in opinions and attitudes of a target. As outlined above, contempt and anger will be directional emotions.

That is, contempt and anger have been linked to prompting “other condemning” responses (Haidt, 2003). As outlined above, contempt will be directed toward the victim while anger will be directed toward the underminer. Contempt promotes an individual to treat the target with less warmth, respect, and consideration in future interactions

(Gervais & Fessler, 2017; Oatley & Johnson-Laird, 1995). Specifically, contempt is associated with the loss of respect (Haidt, 2003; Laham, Chopra, Lalljee, & Parkinson,

2010) and a lower evaluation of a target’s competence (Wojciszke, Abele, & Baryla,

2009). Anger, on the other hand, promotes an individual to seek redress of norm violation or justice breaches (O’Reilly & Aquino, 2011). Specifically, anger is associated with negative evaluation and potential for of the target (Haslam & Loughnan,

2014; Moller & Deci, 2010). (Fear is unique among the three emotions as it is an emotional response that does not target a specific individual, rather it is more situationally focused (Leventhal, 1970).

As both contempt and anger influence how an individual perceives a target, I propose that these emotions will shape reputational changes during the social influence process of social undermining. Specifically, when a social undermining attempt is

41

accepted, and contempt is felt, the witness will develop negative attributions of the victim. Conversely, when a social undermining attempt is rejected, and anger is felt, the witness will become wary of the underminer. Thus, social undermining has an important impact on the reputation of both the victim and the underminer.

Reputation has been linked to trust (Ostrom, 1998) and has been studied extensively in economics research (e.g., King-Casas et al., 2005; Lahno, 1995). Bravo and Tamburino (2008) utilized evolutionary modeling to demonstrate trust’s dependence on the spread of reputation through a social group. Similarly, Sommerfeld, Krambeck, and Milinski (2008) found evidence that positive gossip regarding a target’s reputation increased perceptions of that target’s trustworthiness and that negative gossip decreased perceptions of trustworthiness. Wong and Boh (2010) also found evidence that gossip among peers influence a target’s reputation and peer perceptions of the target’s trustworthiness. Therefore, I propose that feelings of contempt toward a victim will be associated with a negative perception of the victim’s trustworthiness while feelings of anger toward the underminer will be associated with a negative perception of the underminer’s trustworthiness

Hypothesis 3: Feelings of contempt toward the victim will have a negative

relationship with perceptions of victim trustworthiness.

Hypothesis 4: Feelings of anger toward the underminer will have a negative

relationship with perceptions of underminer trustworthiness.

The behavioral responses associated with an emotion are defined as action tendencies (Ekman, 1999; Frijda, 2010; Haidt, 2003; Laham et al., 2010). That is, emotions create an impulse within an individual to behavior in a certain manner – what

42

Izzard (1993) described as behavioral scripts. Each discrete emotion elicits its own unique action tendency. Contempt is associated with social distancing (Mackie et al.,

2000; Roseman, 2013; Roseman et al., 1994). Anger is associated with action (Cannon,

1935; Frijda, 2009). Fear is associated with avoidance (Frijda et al., 1989; Roseman et al.,

1994). However, the expression of these action tendencies may differ given contextual constrains (Lowe & Ziemke, 2011; Mackie et al., 2000).

Contempt is a “cool” emotion (Izard, 1992) that promotes social distance

(Roseman et al., 2003). Contempt indicates that a target is a low-status outsider who is deserving of disdain (Fischer & Giner-Sorolla, 2016). (Gervais & Fessler, 2017) indicate that contempt should be understood as a structure of social affect; contempt is relationship-bounded as it is defined by an absence of respect toward another individual.

Contempt motivates neither approach nor avoid behaviors (Haidt, 2003), but rather promotes attributions of a target that cause an individual to treat the target with less warmth, respect, and consideration in future interactions (Gervais & Fessler, 2017;

Oatley & Johnson-Laird, 1995). As such, low levels of contempt may lead to exclusion and relationship dissolution (Fischer & Roseman, 2007; Frijda, 1986), but higher levels of contempt may lead to mockery and ostracism (Dubreuil, 2010). Therefore, feelings of contempt prompt action to harm the victim. As contempt may promote a broad range of behaviors – all of which work in tandem with the underminer’s actions – I classify the behaviors associated with contempt as “piling on.”

Hypothesis 5: Feelings of contempt toward the victim will have a positive

relationship with (a) counterproductive behaviors toward the victim and (b)

withdrawal from the victim.

43

Anger is a strong emotional drive that promotes action (Frijda, 1986). In response to anger induced by moral violations, individuals seek to compel perpetrators to change their behavior and may engage in overt punishment to encourage compliance to norms

(Fischer & Roseman, 2007). Even when the incident that provoked anger was witnessed rather than felt, anger can still drive a desire for revenge. For example, Haidt & Sabini

(2000; reported in Haidt, 2003) presented participants with video clips that portrayed injustice and asked them to rate a variety of alternative endings. Participants were most satisfied by endings in which the perpetrator suffered in a manner that was equitable to the transgressions, and the perpetrator knew that their suffering was due to their transgression. Thus, anger may direct individuals to engage in retaliatory or revenge behaviors (Bies & Tripp, 2005; Tripp & Bies, 1997). Therefore, feelings of anger prompt action to support the victim and/or attack the underminer.

Hypothesis 6: Feelings of anger toward the underminer will have a positive

relationship with retaliation.

Similar to anger, fear is a strong emotional drive. However, where anger promotes action for change, fear promotes situational avoidance and self-preservation (Lazarus &

Folkman, 1984). Fear was found to be more closely tied to behaviors such as “running away” and “requesting help” than any of the other discrete emotions (Roseman et al.,

1994). This may be due to fear being closely associated with a feeling of low situational control (Reeve, 2014; Roseman, 2013). Thus, fear prompts an individual to evaluate the situation to determine the action that provides the highest degree of safety (Leventhal,

1970; Rogers, 1975). This action tendency may manifest as withdrawal and/or silence behaviors (Kiewitz et al., 2016; Lebel, 2017; LeDoux, 1996). Another strategy that a

44

fearful witness may choose to employee is to support the underminer in order to mitigate the potential of being the next target (Keltner et al., 1997). Whether directly supporting the underminer, or engaging in withdrawal, the behaviors associated with fear all help to promote the underminer’s primary goal; damaging the relational tie to the victim.

Therefore, feelings of fear prompt action directed at protecting oneself through appeasing the underminer.

Hypothesis 7: Feelings of fear toward the underminer will have a positive

relationship with (a) counterproductive behaviors toward the victim and (b)

withdrawal from the victim.

3.5 THE MODERATING INFLUENCE OF POWER

Situational factors limit and shape the expression of emotions to behaviors. The knowledge that an individual can distribute punishment and reward (i.e., has power;

Festinger, 1953), is one of the strongest contextual factors to shape behavior. For example, the behavioral expressions associated with anger are mitigated when the target of anger has a higher (Allan & Gilbert, 2002), the target of anger may be able to retaliate (Deffenbacher, Oetting, Lynch, & Morris, 1996), or to avoid general negative consequences (Averill, 1973; Beatty & McCroskey, 1997). Indeed, this innate consideration may cause individuals to withhold acting on the impulses driven by anger, even without conscious awareness (Smits & De Boeck, 2007). Thus, the expression of behaviors associated with anger should decrease when the underminer is perceived as being powerful. Conversely, as fear is associated with a lack of situational control, perceiving the underminer as powerful should assist the activation of behavioral scripts associated with fear (i.e., deference and safety; Lebel, 2017; Van Kleef, De Dreu, &

45

Manstead, 2004). Therefore, underminer power constrains the behavioral expressions of the witness by weakening actions against the underminer and strengthening actions to protect oneself.

Hypothesis 8: Underminer power will moderate the relationship between

emotions and behaviors such that, when underminer power is high:

(a) the relationship between anger toward the underminer and retaliation will

be weakened.

(b) the relationship between fear toward the underminer and appeasement

will be strengthened.

3.6 STUDY 1

3.6.1 METHODS

3.6.1.1 PARTICIPANTS AND DESIGN

The study sample consisted of 101 full-time working adults recruited from

Amazon MTurk1. This study utilized a critical incident elicitation recall task. Participants were paid $5 for their time. Sampling was constrained to full-time US employees Two attention check questions were administered to ensure data quality. Additionally, participants provided qualitative data regarding their job roles and responsibilities, which was reviewed by independent coders. One participant was removed from this study as the response indicated it was bot-generated, leaving a final sample of 100 full-time working

1 Prior to data collection, the literature was reviewed for best practice recommendations for the use of online panel data sources (e.g., Porter, Outlaw, Gale, & Cho, 2019). MTurk provided a viable option given the need for a sample of working adults and the desire for a sample that crossed multiple industries. Additionally, MTurk provided a more geographically diverse participant pool with large variability in job experiences, thus this sample is potentially more generalizable than other potential samples. For these reasons, M-Turk was determined to be an appropriate data source for this research.

46

adults. Participant ages ranged from 25 to 76 (M = 40.80, SD = 9.72) years old.

Participants had an average of 20.62 (SD = 10.11) years of work experience. The sample was 45% female and predominantly Caucasian (87% Caucasian, 7% African American,

2% Asian/Pacific Islander, 2% Hispanic, 2% Other). Participants came from a variety of industries (e.g., media communication, restaurant, banking, and manufacturing) and a broad range of positions (e.g., cashier, engineer, and general manger).

3.6.1.2 TASK DESCRIPTION

Participants completed a critical incident elicitation recall task utilizing the

Critical Incident Technique (CIT) developed by Flanagan (1954). The CIT has been used extensively in the research of complex social phenomena in industrial and organizational psychology (Butterfield, Borgen, Amundson, & Maglio, 2005) such as revenge (Aquino et al., 2001), deviance among employees (e.g., Crossley, 2009), and deviant interactions between customers and employees (e.g., Leo & Russell-Bennett, 2012). The CIT is useful in research of complex social phenomena as it provides rich data surrounding real-world incidents, which helps researchers explore and understand events and psychological mechanisms that influence emotional and behavioral outcomes (Butterfield et al., 2005).

In this study, participants were asked to recall a time when information was shared with them about a targeted colleague. The type of information was specified to be information which “may have highlighted issues regarding the targeted colleague’s performance at work. Or this information may have focused on the targeted colleague’s personality, character, or ability and may discourage you from interacting with her or him. This type of information is often not easily verified and may or may not have been true.”

47

Participants were asked to provide the initials of the individual who shared the information and the targeted colleague. These initials were then piped into subsequent questions to strengthen the recall process and delineate the underminer from the victim.

To help participants recall the incident, they were asked to describe the incident that occurred, their relationship with the individuals involved in the incident, how they felt after the incident, and if the incident changed their interactions with the people involved.

Following the critical incident questions, participants completed a series of close-ended questions assessing the study’s central variables.

Surveys were completely anonymous to help mitigate socially desirable responses. Examples of the social undermining witnessed include gossip regarding a targeted individual’s professional and personal life activities, as well as negative comments regarding the targeted individual’s abilities or behaviors.

3.6.1.3 MANIPULATION

Underminer power was manipulated between participants by changing the wording in the recall instructions. Participants were randomly assigned to one of two conditions. In the underminer high-power condition, they were instructed to recall a time when a manager or supervisor shared information with them. Participants in the underminer low-power condition were instructed to recall a time when a peer shared information with them. The change in target role between manager/supervisor and peer is a popular power manipulation, both in recall tasks (Gruenfeld, Inesi, Magee, & Galinsky,

2008; Rucker & Galinsky, 2009) and in lab experiments (Galinsky, Gruenfeld, & Magee,

2003; Hsee, Hatfield, Carlson, & Chemtob, 1990; Kipnis, 1972). Underminer power conditions were dummy coded (0 = underminer low-power; 1 = underminer high-power).

48

3.6.1.4 MEASURES

Unless otherwise indicated, all Likert-type measures used a 5-point scale ranging from 1 = strongly disagree to 5 = strongly agree. Relational identification was measured for the underminer and the victim using the four-item scale from Sluss, Ployhart, Cobb, and Ashforth (2012). These items (e.g., “My relationship with [target] was vital to the kind of person I was at work.”) demonstrated an acceptable level of agreement for both the underminer (α = .97) and the victim (α = .97). The discrete emotions were measured using a modified version of (Izard Carroll, Libero Deborah Z, Priscilla, & Mauric, 1993) emotions scale (e.g., “I feel like screaming at somebody or banging on something,” “I feel like somebody is a low-life, not worth the time of day,” and “I feel scared, uneasy, like something might harm me.”). The individual subscales of contempt (α = .89), anger

(α = .77), and fear (α = .94) all exhibited acceptable levels of agreement. The modification implemented was the addition of text entry for the anger and contempt subscales for participants to indicate the target of the emotions. Perceptions of trustworthiness for both the underminer and the victim were measured using 3 items from the Ferrin, Bligh, and Kohles (2008) scale (e.g., “[target] meets his/her obligations to me.”). For both the underminer (α = .97) and the victim (α = 97), this scale presented acceptable reliability. Counterproductive workplace behaviors (CWB) toward the victim and withdrawal from the victim was measured using the 12-item approach/avoidance oriented CWB scale from Ferris, Yan, Lim, Chen, and Fatimah (2016). Example items include “I made fun of [target]” and “I refused to talk to [target].” Both the CWB (α =

.83) and the withdrawal (α = .94) subscales demonstrated acceptable reliability.

Retaliation toward the underminer was measured using a modification of the 4-item scale

49

developed by Skarlicki and Rupp (2010). The scale was changed to reflect the undermining context (e.g., “[Underminer] should be reprimanded for the way she/he treated [target].”) and demonstrated acceptable reliability (α = .94).

Participants respond to a manipulation check measures of their relationship with both the victim and underminer, their recalled emotional state, and their behavioral response to the incident. The underminer power manipulation check included 8-item

Capacity for Power scale (Anderson & Galinsky, 2006), modified to target the underminer (e.g., “I think [underminer] has a great deal of power in the workplace” and

“Even if [underminer] voices them, their views have little sway in the workplace;” α =

.95).

The associated means, standard deviation, alphas, and correlations for all measures for Study 1 are presented in Table 3.1.

3.6.2 ANALYSIS

Path analysis was used to model the data as it models and tests the entire hypothesized pattern of relationships (Figure 3.1) and allows for simultaneous estimation of all path coefficients. Additionally, path analysis allows for the comparison of multiple competing models using various model fit indices. Specifically, to evaluate the model fit,

I use the chi-square (χ2), the comparative fit index (CFI), root mean squared error of approximation (RMSEA), and the standardized root mean square residual (SRMR). CFI provides a sample-size adjusted comparison between the data and the hypothesized model based on the chi-squared test. For CFI, higher numbers are better and values greater than .90 indicate reasonable fit (Bentler, 1990; Cheung & Rensvold, 2001).

RMSEA compares the hypothesized model to the population covariance matrix,

50

providing an estimate that penailizes for the number of parameters (Byrne, 1998). SRMR is the standardized square root of the difference between the sample and model covariance matricies (Byrne, 1998). For both the RMSEA and SRMR, lower numbers are better and values below .08 indicate reasonable fit (MacCallum, Browne, & Sugawara,

1996).

Model fit estimates are presented in table 3.2. The hypothesized model provided acceptable fits based on the criteria outlined above (χ2(16) = 20.08, CFI = .99, RMSEA =

.05, SRMR = .06). As the data gathered for this study is cross-sectional in nature, I utilized the model fits to assess the hypothesis model compared to several potential competing models. First, as path analysis proposes directionality, I compared the hypothesized model to a model running backwards (i.e., behavior to emotion to relational identification). The results of the χ2 difference test indicate that the hypothesized model provided a significantly better fit to the data (Δ χ2(2) = 52.74, p < .01). Then, I compared the hypothesized model to a model that removed the paths from relational identification with the underminer to anger and fear as well as the path from relational identification with the victim to contempt (limited model). The results of the χ2 difference test indicate that this limited model did not provide a better fit (Δ χ2(3) = 3.1, n.s.). Thus, the hypothesized model was retained and used for all hypothesis tests.

3.6.3 RESULTS

Hypothesis 1 predicted that relational identification with the underminer will be

(a) positively related to contempt and negatively related to (b) anger and (c) fear. These hypotheses are tested in the path estimates between relational identification with the underminer and each of the discrete emotions. The estimates between relational

51

identification and contempt (-.12, SD = .10), anger (.01, SD = .09), and fear (.15, SD =

.08) were not significant. Thus, hypothesis 1 was not supported.

Hypothesis 2 predicted that relational identification with the victim will be (a) negatively related to contempt and positively related to (a) anger and (c) fear. These hypotheses are tested in the path estimates from relational identification with the victim and the discrete emotions. These estimates were not significant (contempt = -.09, SD =

.10; anger = -.14, SD = .09; fear = -.03, SD = .08). Thus, hypothesis 2 was not supported.

Hypothesis 3 predicted that feelings of contempt would have a negative relationship with perceptions of victim trustworthiness. This was tested in the path estimate between contempt and perception of victim trustworthiness (-.49, SD = .08, p <

.01). This estimate is significant and in the correct direction. Thus, hypothesis 3 is supported.

Hypothesis 4 predicted that feelings of anger would be negatively related to perceptions of underminer trustworthiness. This was tested in the path estimate for the relationship between anger and perceptions of underminer trustworthiness. While indicating a negative relationship, this estimate (-.08, SD = .10) was not significant. Thus, hypothesis 4 was not supported.

Hypothesis 5 predicted that feelings of contempt toward the victim will be positively related to (a) counterproductive workplace behaviors (CWB) and (b) withdrawal from the victim. Hypothesis 5a was tested in the path estimate between contempt and CWB (.37, SD = .04, p < .01). Hypothesis 5b was tested in the path estimate between contempt and withdrawal (.35, SD = .09, p < .01). Both of these paths were positive and significant. Thus, hypothesis 5 was supported.

52

Hypothesis 6 predicted that anger will be positively related to retaliation. This was tested in the path estimate between anger and retaliation (.17, SD = .10, p < .05), which was positive and significant. Thus, hypothesis 6 was supported.

Hypothesis 7 predicted that fear will be positively related to (a) CWB toward the victim and (b) withdrawal from the victim. These were tested in their correspond paths.

Both paths to CWB (.18, SD = .04, p < .05) and withdrawal (.18, SD = .10, p < .05) were significant and positive. Thus, hypothesis 7 was supported.

Hypothesis 8 predicted the moderating effect of underminer power on the relationship between (a) anger and retaliation and (b) fear and CWB/withdrawal. This was tested through using a multigroup path analysis, using power condition as the grouping variable. Results of this multigroup path analysis is presented in table 3.3. This model presented acceptable model fits (χ2(32) = 41.58, CFI = .98, RMSEA = .07, SRMR

= .08). This model was then compared to a multigroup path analysis model where the paths from anger to retribution, fear to CWB, and fear to withdrawal were held constant between groups. A χ2 difference test suggested that constraining the paths did not provide a significant improvement to model fit. Thus, the model that allowed the paths to vary between groups was retained.

Hypothesis 8a predicted that underminer power would weaken the relationship between anger and retaliation behaviors. This was tested by comparing the path estimate between the low and high underminer power groups. In the low underminer power group, the path estimate was positive and significant (.25, SD = .12, p < .05) while in the high underminer power group the path estimate was not significant (.13, SD = .15, n.s.). This

53

pattern indicates that underminer power weakens the relationship between anger and retaliation behaviors. Thus, hypothesis 8a was supported.

Hypothesis 8b predicted that underminer power would strengthen the relationship between fear and CWB and fear and withdrawal behaviors. This was tested by comparing the appropriate path estimates across the underminer power groups. The non-significant path estimate from fear to CWB in the low underminer power group (-.01, SD = .07, n.s.) becomes significant in the high underminer power group (.29, SD = .05, p < .01).

Similarly, the non- significant path from fear to withdrawal in the low underminer power group (.03, SD = .15, n.s.) becomes significant in the high underminer power group (.24,

SD = .13, p < .05). This pattern supports the moderating effect of power on the relationship between fear and appeasement behaviors. Thus, hypothesis 8b was supported.

3.4 DISCUSSION

This study tested the social influence process of social undermining using a sample of working adults reflecting upon real world events. As suggested by theory, this study found evidence to suggest that a social influence event of social undermining prompts emotional responses which in turn motivate behavioral responses. Interestingly, and counter to theory, this study did not find evidence suggesting that relational identification was a key component influencing the specific discrete emotion felt in response to social undermining. However, exploring the measures of trustworthiness perceptions indicates that individuals found the underminer (M = 3.77) to be a more trustworthy person than the victim (M = 3.29; p < .01). These findings may indicate that witness’ have a proclivity toward siding with the underminer.

54

Reflecting on the gossip literature, the lack of support for relational identification in a single instance of social undermining is not surprising. Gossip is an integral part of human social functioning, even if we don’t readily admit it (Ellwardt et al., 2012; Kniffin

& Wilson, 2005). Individuals seek out gossip to discover information on coworkers, peers, supervisors just as readily as they seek out gossip about famous social influencers and public figures (Dunbar, 2004). Therefore, a strong relational bond between underminer and witness may not be necessary for a single social undermining event to be influential.

The findings of this study did find evidence for the impact of underminer power on several of the emotion-to-behavior relationships. Specifically, the findings suggest a powerful underminer limits the witness’ enactment of retaliation behaviors and promotes the enactment of appeasement behaviors. This is potentially one of the reasons why social undermining is perceived to be accepted by all witnesses. As social undermining is an ambiguous social behavior, there is uncertainty in interpretation. This uncertainty may manifest as feelings of low power relative to the underminer and prompt behaviors that appease the underminer rather than behaviors to confront the underminer. In order to test this post-hoc hypothesis, I performed a series of OLS regressions using Levenson's

(1981) six-item locus of control measure (α = .85) as a predictor for retaliation behavior

(.39, p < .05), CWB toward the victim (-.10, n.s.), and withdrawal from the victim (-.42, p < .05). The pattern of results is consistent with the prediction of the role of uncertainty; individuals engage in more retaliatory behavior when they perceive themselves as having high control in the social undermining situation, but engage in withdrawal behaviors when they perceive themselves as having low control in the social undermining situation.

55

While this study provides important insights into the social mechanisms underlying social undermining, it does have a few limitations. First, as this study is cross- sectional in nature, it can only provide correlational insights. That is, this study is unable to describe the relationships between variables. Social undermining, however, is a dynamic phenomenon. While this study provides important insights into the immediate response to a social influence event of social undermining, a stronger study should test the longitudinal impact of social undermining as a social influence campaign. Second, the sample used in this study came from MTurk. While every precaution was taken, there is no guarantee regarding data integrity. However, this MTurk sample has a strong benefit that no other sample would provide. Namely, it allowed the assessment of social undermining across a large swath of industries, at multiple levels of the organization, and in multiple directions (i.e., peer-to-peer undermining, peer-to-supervisor undermining, supervisor-to-peer undermining). Any other sample would have been restricted on one or more of these dimensions. Finally, this study asked participants to recall an incident of social undermining. This is problematic in that memory is malleable (Smith & Ellsworth,

1987). Additionally, while the recall task was carefully worded, social undermining potentially works best when its undetectable. Therefore, recalling an event that was unnoticed may not be possible. While the recall approach allowed for capturing real- world incidences of social undermining, future studies should assess the direct experience of social undermining, rather than the recalled experience.

3.5 CONCLUSION

In this chapter, I built and tested the witness model of social undermining to suggest that a social undermining should be conceptualized as a social influence event

56

that prompts an emotional response that, in turn, shapes the attitude and behavior of the witness. The findings contained in this chapter highlight the complexity of the social influence mechanism that underlies social undermining. However, it is also apparent from this study that a single instance of social undermining does not provide the full picture. Therefore, in the next chapter I focus on exploring social undermining as a campaign.

57

Table 3.1 Study 1 Descriptive Statistics

Variables Mean SD 1 2 3 4 5 6 7 8 9 10 11 1. Power Conditiona - - - 2. RI w/ Underminer 3.58 1.22 .32 (.97) 3. RI w/ Victim 2.87 1.25 -.02 .05 (.97) 4. Contempt 2.15 1.25 -.27 -.13 -.09 (.89) 5. Anger 2.15 1.07 -.12 .00 -.14 .51 (.77) 6. Fear 1.56 .97 .13 .15 -.03 .18 .33 (.94) 7. Victim TW 3.29 1.32 .09 .06 .32 -.53 -.31 -.04 (.97) 8. Underminer TW 3.77 1.23 .12 .38 -.02 -.02 -.06 .07 -.23 (.84) 9. CWB 1.50 .56 .01 -.19 -.14 .41 .26 .22 -.55 .15 (.83) 10. Withdrawal 2.19 1.30 .06 -.22 -.20 .40 .30 .22 -.61 .16 .92 (.94) 11. Retaliation 1.76 1.17 .09 -.08 .14 -.04 .13 .04 .41 -.59 -.03 -.09 (.94) 12. Gender .45 .50 .06 -.06 -.01 .01 .02 .10 -.07 .07 .27 .22 .03 58 a

Notes: n = 100. Dummy coded 0 = low underminer power, 1 = high underminer power. Values above .28 are statistically significant. Alphas along the diagonal. RI = “Relational Identification.” TW = “Trustworthiness.”

Table 3.2 Study 1 Model Fit Indices

Hypothesized Backward Limited

Fit Indices Model Model Model χ2 20.08 72.815** 23.39 df 16 18 19

Δ χ2 52.74** 3.31

CFI .99 .53 .99 RMSEA .05 .18 .05 SRMR .06 .12 .07 * p < .05; ** p < .01

Table 3.3 Study 1 Power Moderation Test: Multigroup Path Analysis

Low Power High Power Underminer Underminer Paths Est Est Contempt Relational Identification w/ Underminer -.11 .07 Relational Identification w/ Victim -.09 -.09 Anger Relational Identification w/ Underminer -.11 .20 Relational Identification w/ Victim -.04 -.20 Fear Relational Identification w/ Underminer .11 .05 Relational Identification w/ Victim .07 -.13 Perception of Victim Trustworthiness Contempt -.56** -.32** Perception of Underminer Trustworthiness Anger .01 -.22 CWB toward Victim Contempt .45** .37** Fear -.01 .29** Withdrawal from Victim Contempt .43** .38** Fear .03 .24* Retribution toward Underminer Anger .25* .13

Note: A χ2 difference test comparing the above model to a model which held the paths from anger to retribution toward underminer and fear to CWB toward victim and withdrawal from victim constant across groups suggests that allowing the paths to vary between groups produces a better fitting model (Δχ2(3) = 3.65, n.s.).

59

χ2(16) = 20.08, p = .22; CFI = .99, RMSEA = .05, SRMR = .06 .37** -.12 (.04) CWB toward Relational (.10) Contempt toward Victim Identification w/ Victim Underminer -.09 -.49** (.08) Withdrawal from (.10) .35** Victim Perceptions of (.09) Victim TW .01 (.09) .17* Anger toward (.10) Retaliation toward Underminer Underminer -.08 (.10) -.14 60 (.09) Perceptions of

Underminer TW

.15 .18* CWB toward Relational (.08) (.04) Fear Victim Identification w/ Victim -.03 (.08) Withdrawal from .18* Victim (.10)

Figure 3.1 Witness Model of Social Undermining n = 69; † p < .10; * p < .05, ** p < .01 Note: Gender used as a control on all dependent variables. Covariances are estimated among the disturbance terms between contempt, anger, and fear (not shown). Standard errors in parentheses. Effect sizes are standardized. Relational identification with the underminer was used as a control variable on perceptions of underminer trustworthiness. Relational identification with the victim was used as a control variable on perceptions of victim trustworthiness.

CHAPTER 4

STUDY 2: SOCIAL UNDERMINING AS A CAMPAIGN

In Chapter 3, I proposed and tested a witness model of social undermining that explored how and why social undermining works. The key limitation of that study was that it focused on a single social undermining event. While this approach allowed for a detailed examination the confluence of social factors and emotions in the witness’ response to social undermining, it did not provide insight into how social undermining unfolds over time.

The primary purpose of this chapter is to explore social undermining as series of repeated social influence events. That is, this chapter seeks to answer how social undermining may create self-reinforcing spirals. Integrating research on emotions (e.g.,

Forgas & George, 2001; Izard Carroll E., 1993) and social influence (Halevy et al., 2019;

Petty & Cacioppo, 1986), I further develop the witness model of social undermining to propose that witnesses automate their responses to a social underminer, which allows them more easily access to scripted emotional and behavioral responses. Thus, the insidious nature of social undermining is due to the creation of these scripts within the witness, rather than solely on any single social influence event.

In this chapter, I introduce a longitudinal perspective to the witness model of social undermining to suggest that social undermining establishes emotional and behavioral spirals. Additionally, I highlight the importance of social factors at shaping the direction and magnitude of these spirals. I tested my developed hypotheses with a

61

longitudinal behavioral lab study using random coefficient growth modeling. The results of this study support the primary mechanisms of social undermining; specifically that, over time, attitudes and behaviors toward the victim decrease. Surprisingly, this study found an interesting pattern of results when considering the role of social factors (i.e., relational identification and underminer power). The moderator tests suggest that relational identification with the victim may cause punishment behaviors directed toward the underminer, but only in cases where the underminer has low power.

4.1 THEORY AND HYPOTHESIS DEVELOPMENT

As social undermining occurs over an extended period of time (Duffy et al.,

2002), a witness will be exposed to repeated social influence events. As social undermining is insidious, no single social influence event will be overtly aggressive in of itself. However, qualitative work (e.g., Crossley, 2009) suggests individuals prompted to recall social undermining are able to reflect upon, and identify, a social undermining campaign. Therefore, there is something unique about social undermining that allows it to appear acceptable at the time, but is identifiable as a social transgression under cognitive scrutiny.

4.1.1 SOCIAL INFLUENCE

The evolving nature of social undermining is characteristics of indirect social influence in which individuals become easier to sway if exposed to a consistent message over time (Cacioppo & Petty, 1979; DeMarzo et al., 2003). For example, Freedman and

Fraser (1966; see also Burger, 1999) suggest a social influence phenomenon commonly referred to as “foot in the door.” This phenomenon suggests that a small change in opinion caused by one social influence event will make it easier for a similar social

62

influence event to cause a larger change of opinion. In a field study, the authors found that individuals who agreed to a small request (e.g., responding to a survey regarding purchasing habits) predisposed individuals to allow for a large request (e.g., allowing a team of 5-6 individuals into their home to document household products). A similar process may be occurring in what I label as the undermining campaign. Specifically, I define the undermining campaign as a series of social influence events wherein an underminer attempts to shape a witness’ attitude and behaviors toward a targeted victim over time.

The witness may be predisposed to accepting the initial social influence events of a social undermining campaign because it is perceived as gossip or harmless joking. As a witness accepts the first few social influence events, it becomes easier for the social underminer to change the witness’ opinion of the target. Over time, this process becomes a negative spiral. As gossip among peers influences perceptions of the target’s trustworthiness (Wong & Boh, 2010), such negative opinions are likely to manifest as decreased perceptions of trustworthiness. At the same time, gossip helps to strengthen the relationship between the gossiper and the listener (Dunbar, 2004). Such strengthening of the bonds between the gossiper and the listener is likely to manifest as increases in perceptions of trustworthiness. Thus, the witness’ perceptions of the underminer should become more favorable over time over time. Therefore:

Hypothesis 1a: Over the course of an undermining campaign, a witness will

perceive an underminer as more trustworthy.

Hypothesis 1b: Over the course of an undermining campaign, a witness will

perceive a victim as less trustworthy.

63

4.1.2 EMOTIONS

Recall that emotions are believed to be generated through eliciting events

(Cropanzano et al., 2017; Mohr et al., 2019; Weiss & Cropanzano, 1996) such that situational factors direct the discrete emotion experienced (Frijda, 2009; Izard et al.,

1993). For example, contempt has been found to be felt in response to interacting with a perceived low-status other (Laham et al., 2010), while both anger and fear are experienced in response to a transgression (Denson et al., 2011; Mackie et al., 2000).

Thus, as was supported in study 1, a witness is likely to experience contempt when they accept social undermining while they are likely to experience anger or fear when they reject social undermining. The degree to which an individual perceives control over a situation directs whether anger or fear felt (Lebel, 2017).

Over time, the link between situation and emotion becomes strengthened such that discrete emotions are said to have unique elicitors (Ekman, 1999). Additionally, as individuals develop emotion scripts (Izard, 1993), individuals find it easier to experience specific emotions after repeatedly experiencing eliciting events (Frijda et al., 1989).

When considering the undermining campaign, it is likely that the intensity of each discrete emotions will build upon itself in response to repeated experiences of social undermining events. Thus, as the social undermining campaign unfolds, the emotional response to each social influence event may become stronger.

Hypothesis 2: Over the course of an undermining campaign, witness feelings of

(a) contempt toward the victim, and (b) anger and (c) fear toward the underminer

will increase.

64

Emotions help access specific behavioral scripts in response to specific events

(Forgas & George, 2001). This link between emotions and behaviors was found in study

1 wherein contempt and fear lead to behaviors that harmed the victim as well as withdrawal from the victim while anger lead to behaviors that harmed the underminer.

With repeated access, the expression of these behaviors build upon one another such that the behavioral intensity increases. Additionally, the positive spiral of emotions indicates that action tendencies will contain greater motivational force over time. Therefore, responding to the social undermining campaign, the witness will experience greater feelings of contempt for the victim, perceive the victim as being increasingly incompetent or otherwise unworthy, and more likely to punish them. Similarly, responding to the social undermining campaign, the witness will perceive themselves and the underminer as competent contributors and increase rewards.

Hypothesis 3a: Over the course of an undermining campaign, witness behaviors

aiding the underminer will increase.

Hypothesis 3b: Over the course of an undermining campaign, witness behaviors

aiding the victim will decrease.

Hypothesis 3c: Over the course of an undermining campaign, witness behaviors

aiding the self will increase.

4.1.3 ROLE OF SOCIAL FACTORS

As indicated by the COR, and specified in the witness model of social undermining in Chapter 3, social factors influence the degree to which social influence is successful in changing opinions. Relational identification – the integration of a relationship into one’s core self-concept (Sluss & Ashforth, 2007) – is a strong social

65

factor that shapes social influence as it depicts the degree to which an individual has come to develop a deep relationship with a partner. Such deep relationships manifest as deep levels of trust with the a partner (Lewicki & Bunker, 1996), a haloing effect regarding attributions of a partner (Sluss & Ashforth, 2007), and a degree to which an individual respects a partner (Aron & Aron, 2000; Ashforth & Mael, 1989). In the hypotheses developed above, we followed the course of the social undermining literature with the assumption that the witness has a high degree of relational identification with the underminer. However, the witness may just as likely have a high degree of relational identification with the victim. In such a case, the witness is less likely to accept social undermining and more likely to identify it as a social transgression. As the transgressions compound, due to the social undermining campaign, the witness will be less likely to feel contempt and more likely to feel anger and fear (Aquino et al., 2001).

Hypothesis 4: Relational identification between the witness and the victim

moderates the impact of an undermining campaign on emotion, such that

(a) witness feelings of contempt toward the victim will decline over time.

(b) witness feelings of anger toward the underminer will increase over time.

(c) witness feelings of fear toward the underminer will increase over time.

Additionally, as the transgressions compound, the witness is more likely to identify the underminer as having an agenda behind their gossip. When identified, individuals who are believed to be spreading rumors through gossip for a selfish goal are perceived as less trustworthy and respectable (Dunbar, 2004). At the same time, as the witness evaluates the repeated social influence events, the witness is forced to reflect upon the reputation of the victim. Rejecting the social influence attempt strengthens an

66

individual’s current evaluation and opinion of a target (Ellwardt et al., 2012). Therefore, it is likely that the witness will perceive the victim as more trustworthy over time.

Hypothesis 5: Relational identification between the witness and the victim

moderates the impact of an undermining campaign on perceptions of

trustworthiness, such that

(a) witness perceptions of underminer trustworthiness will decline over time.

(b) witness perceptions of victim trustworthiness will increase over time.

Finally, as emotions and perceptions become automated in response to the rejection of social undermining events, it is more likely that the witness will create corresponding scripts to help the victim and harm the underminer. As the witness may experience co-victimization (Skarlicki & Rupp, 2010), they may engage in self- supporting behaviors to help alleviate the psychological stress they experience. Thus, the expected behaviors will change such that:

Hypothesis 6: Relational identification between the witness and the victim

moderates the impact of an undermining campaign on behaviors, such that

(a) witness behaviors aiding the underminer will decline over time.

(b) witness behaviors aiding the victim will increase over time.

(c) witness behaviors aiding the self will increase over time.

Similar to relational identification, the power of the underminer has the ability to set the trajectory for the witness’ expression of behaviors. Power – the ability to distribute rewards or enact punishment (Festinger, 1953) – limits an individual’s ability and desire to engage in retribution behavior for fear of retaliation (Deffenbacher et al.,

1996) or other negative consequences (Averill, 1973; Beatty & McCroskey, 1997). Thus,

67

the power of the underminer will shape the witness’ choice of behavior. As indicated before, these behaviors become encoded in scripts and the witness will become more likely to engage in similar behaviors in the future. Thus, as underminer power increases, the witness is more likely to help the underminer, as a method of appeasement, and less likely to provide aid to the witness or the self, in order to prevent the possibility of becoming a future target.

Hypothesis 7: Underminer Power will moderate the impact of an undermining

campaign on behavior, such that

(a) witness behaviors aiding the underminer will increase over time.

(b) witness behaviors aiding the victim will decrease over time.

(c) witness behaviors aiding the self will decrease over time.

4.2 STUDY 2

4.2.1 METHODS

4.2.1.1 PARTICIPANTS AND DESIGN

The study sample consisted of 53 undergraduate students recruited from a large university in southeastern United States. Participants were offered extra credit for participation as well as $15 monetary compensation. This study was a 3-factor longitudinal experiment where participants play a 21-round game with two computer partners. Data was gathered every 3 rounds during the game. 9 participants were dropped for suspecting they were playing with computer partners, leaving 44 participants and a total of 308 observations. Participant ages ranged from 18 to 22 (M = 19.91, SD = .86) years old. The sample was predominantly male (70%) and predominately Caucasian

(70% Caucasian, 16% Asian/Pacific Islander, 7% African American, and 7% Hispanic).

68

4.2.1.2 TASK DESCRIPTION

This experiment used a cognitively demanding task, named the t-task, which allowed for a within-person (undermining messages) and two between-person (relational identification with victim or with underminer and underminer power high or low) manipulations. The experiment was run on zTree (Fischbacher, 2007), an open source computer platform, and participants facial expressions were recorded. The t-task is a game wherein participants had 15 seconds to click on all occurrences of the letter “t” within a 10x10 grid of letters. Grids were randomly generated for each participant each round. Participants were ostensibly grouped with two other participants. After completing a round of the t-task, participants were shown their individual performance as well as their group’s performance. Participants were then allowed to send private messages to their fellow group members. These messages would only be read by the specific player and not by the any other group member. One group member was randomly selected to be a “silent player;” meaning that they could receive but not send messages. Every three rounds, the average team performance was calculated. If the group’s performance put them into the 50th percentile, they were rewarded with 9 points. One participant was randomly chosen to be the “point allocator;” distributing the points among the group members during the game. The point distribution of the points was then displayed to the participants. Finally, participants were informed that a $5 bonus will be rewarded at the end of the game based on individual performance.

The paradigm of the t-task requires . While participants were told they were paired with others in the room, they were, in fact, paired with two pre-programed computers that provided scripted messages. Additionally, regardless of actual

69

performance on the t-task, the displayed individual and team performances were held constant across participants while varying across rounds. Finally, participants were always assigned to both the role of the “silent player” and the “point allocator.”

4.2.1.3 WITHIN-PERSON MANIPULATION

During the game, participants received pre-scripted messages from their computer group members. These messages were designed to convey a gradual increase in undermining. Specifically, one computer player (the underminer) made undermining statements regarding the performance and ability of the other computer player (the victim). The victim computer player made neutral comments related to the t-task.

4.2.1.4 BETWEEN-PERSON MANIPULATION

Relational identification was manipulated through the team formation process using an adaptation of the minimal group technique (Hertel & Kerr, 2001; Lemyre &

Smith, 1985). Prior to the lab, participants completed a survey of psychometric questions and provided a unique code, which they were told to bring to the lab. At the start of the lab, participants were asked to enter their unique code so that groups could be built based on their personalities. Participants were also prompted to provide demographics information (age, gender, and major) as well as select a “spirit animal” (an image of a fish, bird, dog, mouse, or snake). Participants were then presented with a screen which displayed demographic information, “spirit animal” choice and a personality description for all three group members. This personality description utilized either the positive or negative descriptions developed by Forer (1949), which were designed in the same manner as horoscopes: to be general and vague enough that anyone can find that it reflects their personality. Participants were always received the positive personality

70

description. Individuals in the underminer relational identification condition were shown a screen wherein they shared the same approximate age (Participant age minus 1), the same gender, the same major, the same spirit animal, and the same personality description as the underminer, while the victim was much older (Participant age + 5), a different gender, a different major, a different spirit animal, and a different personality description. The same manipulation was used for the victim relational identification condition, except that the victim shared the same information as the participant while the underminer differed.

Underminer power was manipulated through the manner by which the $5 bonus was awarded at the end of the game. Participants in the high underminer power condition were informed that one group member will be randomly selected to review the average performance of each group member at the end of the game to determine who should receive the $5 bonus. The underminer computer player was always selected for this role.

Each time participants reviewed the round results, they were shown a message reminding them that the underminer computer player had the power to distribute this reward at the end of the game. Participants in the low underminer power condition were told that the experimenter would review the average individual performance and allocate the $5 bonus.

4.2.1.5 PROCEDURE

Approximately a week before the in-lab portion of the study, participants completed an online questionnaire which gathered background characteristics.

Participants were told that they would play a game called the t-Task Game and that they would be randomly assigned to groups of three. To minimize end-game effects (Cochard,

71

Van, & Willinger, 2004), participants were not informed of the number of rounds in the game. All participants then went through a practice round where the groups were formed and the t-task was displayed and explained. At the end of the practice round, participants completed a brief competency check to ensure that they understood the game. The participants were then told they would be assigned to their roles. In reality, all participants were placed in the role of the silent player and the point allocator.

4.2.1.6 DEPENDENT VARIABLES

Perceptions of trustworthiness for the underminer and the victim were measured every three rounds, following the allocation of points, using three items from (Ferrin et al., 2008). These items were “[partner] meets his/her obligations to me,” “[partner] deals with me honestly,” and “in my opinion, [partner] is reliable.” These measures presented acceptable levels of reliability (alphas ranging from .79 to .98 for perceptions of underminer trustworthiness and .81 to .92 for perceptions of victim trustworthiness).

Emotions were measured by processing videos of participant using the facial analysis software, Affectiva. Affectiva is an analysis software built upon the facial action coding system (FACs) developed by Ekman and Friesen (1978). FACs has been used in a wide array of fields to study the influence of emotions on cognition and behavior (e.g.,

Broch-Due, Kjærstad, Kessing, & Miskowiak, 2018; Huseynov, Kassas, Segovia, &

Palma, 2019). Affectiva uses a neural learning algorithm to apply FACs to frame-by- frame video processing, and has been verified in several large scale studies (e.g., Stöckli,

Schulte-Mecklenbeck, Borer, & Samson, 2018). As emotions are short-term feelings

(Ekman, 1992; Frijda, 1986), contempt, anger, and fear were calculated as the maximum

72

FACs value for each emotion during the 5 second interval following the display of the undermining messages.2

Aiding behaviors were measured as the proportion of the reward distributed to each player every three rounds. Participants were asked to choose the percentage of the 9 point reward to give to each player. Percentages were used to prevent participants from following a strategy of equal distribution, encouraging participants to reward/punish their fellow players.

The average reward distributed to each player per condition per round is displayed in figures 4.1 - 4.3. The average perceptions of trustworthiness per condition per round is displayed in figures 4.4 and 4.5. Means, standard deviations, alphas, and correlations are presented in table 4.1.

4.3 ANALYSIS

Random coefficient growth modeling analyses were conducted to examine the dynamic confluence of social factors on the growth of emotional, attitudinal, and behavioral response to social undermining. Statistical models were estimated using the nlme package (Pinheiro & Bates, 2000) in the open software platform, R. Following the procedure established in literature (Bliese & Ployhart, 2002), I created a variable (Time) to estimate the trajectory of growth for the dependent variables. Time was coded as a sequential vector starting from 0 and incrementing by 1 for each observation period (0 to

7 for the trustworthiness and behavior analysis, 0 to 20 for the emotions analysis).

2 As there is minimal guidance within the literature, and in order to assess the robustness of the results presented in this study, I also ran the models using the maximum of the likelihood values during the 3 second and 7 second intervals following the display of partner messages as well as the average of the likelihood values in each of these time period following the display of partner messages. All results were consistent with what is displayed in this paper.

73

4.4 RESULTS

I followed the five-step modeling process for random coefficient growth modeling presented by Bliese and Ployhart (2002). First, I estimated the intraclass correlation (ICC) to test the degree of within-person variance on each of the dependent variables. Second, I estimated a model with Time as a predictor to assess the pattern of overall within-person change. Third, I tested the degree of between-person change by allowing slopes to randomly vary. Fourth, I tested for the influence of autocorrelation in the residuals.

Finally, I included the condition dummy codes (relational identification and underminer power) to test my substantive hypotheses.

Table 4.2 and 4.4 provides the results of the log likelihood tests used during the model building process outlined above. For perceptions of trustworthiness and aiding behavior, the results of the model building process indicate that the best fitting models allowed for random intercepts as well as allow for time to randomly vary between subjects and accounted for autocorrelation. For contempt, a model with random intercepts only fit the data best. For anger, a general linear model fit the data best. However, according to Bliese, Maltarich, and Hendricks (2018), there is no drawback to modeling random intercepts when this test fails. Therefore, and to keep the models consistent in this set of analyses, I will model anger with a random intercept. For fear, a model with random intercept and slope fit the model best.

Perceptions of trustworthiness demonstrated relatively high ICCs (ICCUnderminer =

.53; ICCVictim = .50), as did aiding behaviors (ICCunderminer = .40; ICCvictim = .36; ICCself =

.57). This is unsurprising given that these are within-individual measures. In such circumstances, we would expect to find high within-entity agreement. The emotions

74

demonstrated diverging ICCs with contempt (ICC = .05) and anger (ICC = .01) having low values and fear (ICC = .44) having a high value. According to Bliese et al. (2018), even low values of ICC indicate that there are within-entity effects occurring. Thus, though low, these ICCs provide interesting insights into the nature of emotions.

Specifically, contempt and anger may be much more situationally constrained within an individual whereas fear is more global.

Results for the basic growth model (i.e., control and time variables; Model 1), the main effects model (i.e., inclusion of condition dummy codes; Model 2), and the interaction effects model (i.e., inclusion of interaction terms between time and each condition dummy code; Model 3) are presented in tables 4.5 to 4.7.

Hypothesis 1 predicted (a) the growth of perceptions of underminer trustworthiness and (b) the decline of perceptions of victim trustworthiness over time.

Hypothesis 1a and 1b are tested by the time coefficient in Model 1 of table 4.5. Time is not a significant predictor of perceptions of underminer trustworthiness (Time = .02, n.s.), but it is a significant predictor of perceptions of victim trustworthiness (Time = -

.14, p < .01) suggesting perceptions of victim trustworthiness decrease over time. Figure

4.6 displays the decline of victim trustworthiness. Thus, while hypothesis 1a was not supported, hypothesis 1b was supported.

Hypothesis 2 predicted that the emotions of (a) contempt, (b) anger, and (c) fear will increase over time. These hypotheses were tested by the time coefficient in Model 1 of table 4.6. Time was a marginally significant, negative predictor of anger (Time = -.09, p < .10) and was not a significant predictor for either contempt (Time = -.11, n.s.) or fear

(Time = -.02, n.s.). Thus, hypothesis 2 was not supported.

75

Hypothesis 3 predicted that behaviors aiding (a) the underminer and (c) the self will increase, while behaviors aiding (b) the victim will decrease over time. These hypotheses were tested by the time coefficient in Model 1 of table 4.7. Time was not a significant predictor of behaviors aiding the underminer (Time = .45, n.s.), but was a significant predictor of behaviors aiding the victim (Time = -1.57, p < .01) and the self

(Time = 1.29, p < .01). The declining growth in behaviors aiding the victim is depicted in figure 4.7. Thus, while hypothesis 3a was not supported, hypotheses 3b and c were supported.

The next set of hypotheses explore the influence of the social factors of relational identification and underminer power. Hypothesis 4 predicted that relational identification with the victim will (a) decrease growth of contempt, but increase growth of (b) anger and (c) fear. These hypotheses were tested by the Time*Relational Identification coefficient in Model 3 of table 4.6. This interaction term was not significant for contempt

(Time*Relational Identification = .15, n.s.), but was significant for anger

(Time*Relational Identification = .22, p < .05) and marginally significant for fear

(Time*Relational Identification = .56, p < .10). As depicted in figure 4.8, relational identification flips the decline of fear such that participants who identified with the victim experienced an increase in fear over time. While the interaction term for relational identification and time predicting anger was mathematically significant, it is not of practically significant. Specifically, the model indicates that the average likelihood of experiencing anger during the experiment was 3.31% and every round it increased by

.22%. Thus, there is only marginal support for hypothesis 4.

76

Hypothesis 5 predicted that relational identification with the victim will (a) decrease the growth of perceptions of underminer trustworthiness and (b) increase the growth of perceptions of victim trustworthiness. These were tested by the coefficient for the interaction term of Time and Relational Identification in Model 3 of table 4.5. The interaction term was not significant for perceptions of either underminer trustworthiness

(-.03, n.s.) nor victim trustworthiness (-.02, n.s.). Thus, hypothesis 5 was not supported.

Hypothesis 6 predicted that relational identification with the victim will (a) decrease the growth of behaviors aiding the underminer while increasing the growth of behaviors aiding (a) the victim and (b) the self. These hypotheses were tested in the interaction term Time*Relational Identification in Model 3 of table 4.7. Relational identification significantly moderated the growth of behavior aiding the underminer

(Time*Relational Identification = -1.28, p < .05) and marginally significantly moderated the growth of behavior aiding the self (Time*Relational Identification = 1.36, p < .10), but not behavior aiding the victim (Time*Relational Identification = -.07, n.s.). The moderating influence of relational identification with the victim on behaviors aiding the underminer and the self are presented in figures 4.9-4.10 and 4.11-4.12, respectively. As seen in figures 4.9 and 4.10, participants in the relational identification with the victim condition engaged in less behaviors aiding the underminer over time compared to those in the relational identification with the underminer condition, regardless of the power of the underminer. As seen in figures 4.11 and 4.12, participants in the relational identification with the victim condition engaged in more behaviors aiding the self over time compared to those in the relational identification with the underminer condition, regardless of the power of the underminer. Thus, hypothesis 6 was largely supported.

77

Finally, hypothesis 7 predicted that underminer power will (a) increase the growth of behaviors aiding the underminer and decrease the growth of behaviors aiding (a) the victim and (b) the self. These hypotheses were test in the coefficient of the

Time*Relational Identification interaction term in Model 3 of table 4.7. While this interaction was not significant for behaviors aiding the underminer (Time*Relational

Identification = .83, n.s.), behaviors aiding the victim (Time*Relational Identification = -

.87, n.s.), nor behaviors aiding the self (Time*Relational Identification = -.06, n.s.), each coefficient was in the hypothesized direction. However, hypothesis 7 was not supported.

4.5 DISCUSSION

This study sought to establish the accumulated effects of social undermining on a third-party witness within a social structure. As suggested by the social undermining literature, this study found evidence that social undermining prompts an overall decline in the witness’ perceptions of the victim behaviors aiding the victim. However, counter to the social undermining literature, this study did not find evidence for a corresponding increase in perceptions of the underminer nor behaviors aiding the underminer. There was evidence suggesting that relational identification may be an important moderator on the growth of perceptions and behaviors. Relational identification with the victim appears to significantly decrease behaviors aiding the underminer. Additionally, relational identification with the victim appears to influence the emotional response to social undermining such that the rate at which anger and fear grow increases over time.

Worth noting are a few hypotheses that failed to find support. Specifically, there appears to be limited support for the growth of emotional response over time. This may be indication that discrete emotional responses do not grow or decline over time.

78

However, the current models fail to test the direct influence of emotions on the growth or decline in perceptions and behaviors following social undermining. Supplemental analysis of the influence of the discrete emotions of anger, fear, and contempt on the growth of aiding behaviors are presented in table 4.8. These results suggest that, while the expression of emotions themselves may not change over time, discrete emotions may influence the outcomes of the social influence process of social undermining. This interpretation is supported in the findings from Chapter 3. Future research should look further into the direct relationship between emotional states and witness responses to social undermining.

Second, due to the number of participants (n = 44), it is possible that this study is under powered to adequately test the between-person effects. Going forward, it will be important to test these findings using a larger sample size to test the between-person effects. In a recent study, Ferris et al. (2016) examined the mediating effect of emotions

(anger and anxiety) on the relationship between abusive supervision and enactment of approach/avoidance-oriented CWB. The average correlation between abusive supervision and all other variables was r = 0.40. Based on an alpha of 0.05, I estimate a sample size of 46 observations per cell will provide me with a power of 0.80 for the desired effect sizes. Therefore, the next iteration of this study will require approximately 184 participants to fill all four cells in my 2 (relational identification) x 2 (underminer power) empirical design.

Similarly, while the power manipulation was built upon several successful implementations in the literature (e.g., (Anderson & Berdahl, 2002; Briñol, Petty, Valle,

Rucker, & Becerra, 2007; Galinsky et al., 2003; Overbeck & Park, 2001; Sachdev &

79

Bourhis, 1985; Schmid Mast, Jonas, & Hall, 2009), it may be beneficial to update and implement a stronger manipulation. While participants in the high underminer power condition were reminded each round that the underminer would determine if they were deserving of a $5 bonus at the end of the round (thus, placing the underminer in a position to reward or punish the participant), exit interviews with the participants indicate that the importance of this role assignment may have decreased over the course of the study.

Finally, this study suffered due to the technical limitations of the behavioral lab.

Specifically, the zTree program created required a large amount of computational power to create the random boards presented to each individual and to organize the orchestration and display of stimuli at the correct times during the study. This can be overcome through two steps. First, as zTree loads all screens each round (even when they are marked as

“unseen”), removing the training round from the task rounds will facilitate in faster transitions. Second, pre-generating 10x10 grids and fixing these grids across participants will alleviate the computational power in randomly creating the grids each round. This will drastically reduce the time required to cycle from one round to the next round.

4.6 CONCLUSION

This chapter allowed for the exploration of social undermining as a longitudinal social influence process designed to shape the opinion and attitude of the witness. The findings of this chapter help to define why it is important to consider the witness when discussing social undermining. Assuming the witness responds in a manner that is conducive to the goals of the underminer overlooks much regarding what is occurring.

Social undermining is unique due to the witness, and therefore, it is the actions and

80

reactions of the witness that should determine if the phenomenon is social undermining or not. By understanding social undermining through the lens of the witness, it is possible to determine how to interrupt the social influence mechanisms at play and direct witness responses to be more conducive to creating a safer and happier workplace.

81

Table 4.1 Study 2 Descriptive Statistics

Variables Mean SD 1 2 3 4 5 6 7 8 9 10 1. Power Conditiona - - - 2. Relational Identification - - 0.04 - Conditionb 3. Average Perceptions of 4.34 .62 -0.04 0.12 (.90) Underminer Trustworthiness 4. Average Perceptions of 3.73 .81 -0.05 0.13 0.66 (.85) Victim Trustworthiness 5. Average Contempt 9.45 9.62 -0.14 -0.03 0.05 -0.01 - 6. Average Anger 1.13 2.44 0.06 -0.21 -0.10 -0.07 0.05 - 7. Average Fear 18.74 17.86 -0.37 -0.17 0.08 0.12 0.16 0.16 - 8. Average Underminer 32.70 6.22 0.09 -0.29 0.23 -0.03 -0.05 0.03 0.24 - Aiding Behavior 82 9. Average Victim Aiding 26.34 6.84 -0.07 -0.12 0.18 0.47 -0.05 0.20 0.26 0.42 - Behavior 10. Average Self Aiding 40.95 11.01 0.00 0.24 -0.24 -0.27 0.06 -0.14 -0.30 -0.83 -0.86 - Behavior Notes: n = 44. aDummy coded 0 = low underminer power, 1 = high underminer power. bDummy Coded 0 = relational identification with the underminer, 1 = relational identification with the victim. Values above .41 are statistically significant. Alphas along the diagonal.

Table 4.2 Study 2 Model Building Log Likelihood Tests – Perceptions of Trustworthiness

Model Perceptions of Underminer Perceptions of Victim Trustworthiness Trustworthiness Log Log

df Likelihood L. Ratio df Likelihood L. Ratio Step 1 Fixed Intercept 2 -424.13 2 -525.48 Random Intercept 3 -343.29 161.67** 3 -452.90 145.17** Step 2 Fixed Slopes 4 -285.36 4 -390.34 Step 3 Random Time 6 -255.38 59.96** 6 -385.00 10.69** Step 4 Autocorrelation 7 -252.33 6.11* 7 -379.50 11.00**

83

* p < .05; ** p < .01. n = 308, 44 participants over 7 rounds.

Table 4.3 Study 2 Model Building Log Likelihood Tests – Behaviors

Model Underminer Aiding Behavior Victim Aiding Behavior Self Aiding Behavior Log Log Log

df Likelihood L. Ratio df Likelihood L. Ratio df Likelihood L. Ratio Step 1 Fixed Intercept 2 -1271.85 2 -1317.71 2 -1424.11 Random Intercept 3 -1223.27 97.16** 3 -1276.63 82.16** 3 -1330.98 186.31** Step 2 Fixed Slopes 4 -1069.25 4 -1091.64 4 -1136.90 Step 3 Random Time 6 -1038.70 61.09** 6 -1077.24 28.80** 6 -1095.71 82.37** Step 4 Autocorrelation 7 -1032.57 12.26** 7 -1073.82 6.83* 7 -1086.37 18.68**

84 * p < .05; ** p < .01. n = 308, 44 participants over 7 rounds.

Table 4.4 Study 2 Model Building Log Likelihood Tests – Emotions

Model Contempt Anger Fear Log Log Log

df Likelihood L. Ratio df Likelihood L. Ratio df Likelihood L. Ratio Step 1 Fixed Intercept 2 -3221.63 2 -2311.30 2 -3172.86 Random Intercept 3 -3216.90 9.45** 3 -2311.02 .56 3 -3023.87 297.99** Step 2 Fixed Slopes 4 -3217.53 4 -2311.67 4 -3024.99 Step 3 Random Time 6 -3216.73 1.61 6 -2306.40 10.54** 6 -3021.02 7.94* Step 4 Autocorrelation 7 -3216.14 1.17 7 -2304.83 3.15† 7 -3021.02 .00

85

† p < .10; * p < .05; ** p < .01. n = 924, 44 participants over 21 rounds.

Table 4.5 Study 2 Perceptions of Trustworthiness Growth Models

Model 1 Model 2 Model 3 Basic Growth Main Effects Interaction Effects Variable Est SE Est SE Est SE Underminer

Trustworthiness Intercept 4.31** .11 4.19** .17 4.14** .15 Time .02 .02 .02 .02 .06 .05

Relational Identificationa .23 .18 .26 .16 Underminer Powerb .02 .19 .05 .17

Time*Relational Identification -.03 .06 Time*Underminer Power -.03 .06

Victim Trustworthiness Intercept 4.10** .11 4.08** .27 4.14** .24 Time -.14** .03 -.14** .03 -.17** .05

Relational Identificationa .24 .29 .27 .26 Underminer Powerb -.20 .29 -.33 .26

Time*Relational Identification -.02 .06 Time*Underminer Power .08 .06 Note: † p < .10, * p < .05, ** p < .01; aCoded 0 = Identification with Underminer, 1 = Identification with Victim; bCoded 0 = Low Underminer Power, 1 = High Underminer Power

86

Table 4.6 Study 2 Emotions Growth Models

Model 1 Model 2 Model 3 Basic Growth Main Effects Interaction Effects Variable Est SE Est SE Est SE Contempt Intercept 10.96** 2.30 12.48** 3.29 15.19** 4.25 Time -.11 .18 -.11 .18 -.38 .32

Relational Identificationa .28 3.00 -1.81 4.68 Underminer Powerb -2.26 3.06 -5.49 4.77

Time*Relational Identification .15 .35 Time*Underminer Power .32 .36

Anger Intercept 2.11* .84 2.21* 1.00 3.31* 1.55 Time -.09† .06 -.09 .06 -.18† .11

Relational Identificationa -.30 .71 -3.12† 1.69 Underminer Powerb .07 .73 .73 1.73

Time*Relational Identification .22† .12 Time*Underminer Power -.05 .12

Fear Intercept 19.28** 3.44 29.59** 5.07 33.73** 5.98 Time -.02 .16 -.03 .16 -.35 .29

Relational Identificationa -3.60 5.01 -10.61 6.49 Underminer Powerb -13.94* 5.11 -14.69* 6.62

Time*Relational Identification .56† .32 Time*Underminer Power .06 .33 Note: † p < .10, * p < .05, ** p < .01; aCoded 0 = Identification with Underminer, 1 = Identification with Victim; bCoded 0 = Low Underminer Power, 1 = High Underminer Power

87

Table 4.7 Study 2 Behavior Growth Models

Model 1 Model 2 Model 3 Basic Growth Main Effects Interaction Effects Variable Est SE Est SE Est SE Underminer Aiding

Behavior Intercept 31.47** .89 32.15** 1.36 32.08** 1.51 Time .45 .34 .46 .33 .59 .56

Relational Identificationa -1.76 1.40 -.15 1.63 Underminer Powerb -.31 1.43 -.71 1.66

Time*Relational Identification -1.28* .61 Time*Underminer Power .83 .62

Victim Aiding Behavior Intercept 30.48** .93 31.89** 1.74 31.06** 1.79 Time -1.57** .27 -1.78** .35 -1.17† .62

Relational Identificationa -2.07 1.81 -1.98 1.93 Underminer Powerb .32 1.84 1.38 1.96

Time*Relational Identification -.07 .67 Time*Underminer Power -.87 .68

Self Aiding Behavior Intercept 37.73** 1.60 36.95** 2.28 36.99** 2.41 Time 1.29** .37 1.29** .43 .54 .76

Relational Identificationa 2.56 2.45 2.13 2.60 Underminer Powerb -.71 2.48 -.72 2.64

Time*Relational Identification 1.36† .82 Time*Underminer Power .06 .83 Note: † p < .10, * p < .05, ** p < .01; aCoded 0 = Identification with Underminer, 1 = Identification with Victim; bCoded 0 = Low Underminer Power, 1 = High Underminer Power

88

Table 4.8 Study 2 Influence of Discrete Emotions on Behavior

Model 1 Model 2 Model 3 Basic Growth Main Effects Interaction Effects Variable Est SE Est SE Est SE Underminer Aiding Behavior Intercept 31.47** .89 32.65** 1.08 32.92** 1.18 Time .45 .34 .38 .31 .18 .40

Contempt -.02 .02 -.04 .03 Anger -.06 .05 .00 .16 Fear -.03 .02 -.04 .03

Time*Contempt .01 .01 Time*Anger .03 .09 Time*Fear .00 .01

Victim Aiding Behavior Intercept 30.48** .93 28..07** 1.30 29.40** 1.39 Time -1.57** .27 -1.18** .36 -1.78** .45

Contempt .02 .02 -.02 .03 Anger -.05 .07 -.15 .21 Fear .09** .03 .04 .04

Time*Contempt .02† .01 Time*Anger .06 .11 Time*Fear .02 .01

Self Aiding Behavior Intercept 37.73** 1.60 39.61** 1.43 37.69** 1.55 Time 1.29** .37 .69 .43 1.58** .47

Contempt .00 .02 .05† .03 Anger .01 .06 .20 .18 Fear -.06* .03 .01 .04

Time*Contempt -.03** -.01 Time*Anger -.11 .10 Time*Fear -.03* .01 Note: † p < .10, * p < .05, ** p < .01; aCoded 0 = Identification with Underminer, 1 = Identification with Victim; bCoded 0 = Low Underminer Power, 1 = High Underminer Power

89

Figure 4.1 Study 2 Underminer Aiding Behaviors Per Round

Figure 4.2 Study 2 Victim Aiding Behaviors Per Round

90

Figure 4.3 Study 2 Self Aiding Behaviors Per Round

Figure 4.4 Study 2 Perceptions of Underminer Trustworthiness Per Round

91

Figure 4.5 Study 2 Perceptions of Victim Trustworthiness Per Round

Figure 4.6 Study 2 Perceptions of Victim Trustworthiness Growth (Victim Trustworthiness Model 1, Table 4.5)

92

Figure 4.7 Study 2 Growth of Victim Aiding Behavior (Victim Reward Model 1, Table 4.7)

Figure 4.8 Study 2 Growth of Fear predicted by Relational Identification (Averaged across Power Condition; Fear Model 3, Table 4.6)

93

Figure 4.9 Study 2 Underminer Aiding Behavior by Relational Identification (Low Underminer Power)

Figure 4.10 Study 2 Underminer Aiding Behavior by Relational Identification (High Underminer Power)

94

Figure 4.11 Study 2 Self Aiding Behavior by Relational Identification (Low Underminer Power)

Figure 4.12 Study 2 Self Aiding Behavior by Relational Identification (High Underminer Power)

95

CHAPTER 5

DISCUSSION

This dissertation extends the current social undermining literature and challenges the key, unstated assumption of previous research. Integrating theory and empirical findings of the social influence literature and the emotions literature, this dissertation conceptualizes social undermining as a social influence process that changes the social fabric of the workplace into an environment of indifference, and ultimately hostility, toward a targeted individual. In so doing, this dissertation changes the current focus in the literature from the underminer or the victim to the witness. Social undermining cannot be identified through the motivations of the underminer – as those motivations can equally motivate alternative behaviors (e.g., Reh, Tröster, & Van Quaquebeke, 2018) – or the perceptions of the victim – as the experience of victimization is not unique to social undermining (e.g., Aquino & Thau, 2009). Rather, social undermining should be identified through its influence on the witness.

Using the social influence framework of social undermining, I proposed and tested the witness model of social undermining in two studies; one cross-sectional and one longitudinal. The first study (Chapter 3) approached social undermining as a single social influence event in order to explore the underlying sociological and psychological mechanisms of social undermining. Using a recall task, 100 individuals provided informative data regarding real-world social undermining experiences. The results of this study demonstrated that social undermining prompts discrete emotional responses that

96

shape the witness’ attitudes and behaviors. Additionally, this study demonstrated the importance of social factors (i.e., underminer power) in shaping the expression of different behaviors. The second study (Chapter 4) viewed social undermining through a dynamic lens in order to explore how a campaign of social undermining may influence self-reinforcing emotional, attitudinal, and behavioral spirals. Utilizing a cognitively taxing, multi-round task, 44 individuals were exposed to a series of social undermining messages. Through a combination of computer aided emotion-analysis, self-report, and behavioral choice, this study found evidence to suggest a strong main effect of social undermining prompting behaviors that would harm the victim, over time. Additionally, relational identification appeared to influence how the individual chose to behave toward the underminer, but not toward the victim. Counter to the first study, underminer power did not appear to influence the expression of behavior.

5.1 THEORETICAL IMPLICATIONS

This dissertation offers four theoretical implications to the literature. First, by integrating social influence theories into the current body of work, this dissertation clarifies social undermining’s distinction from similar constructs such as incivility (e.g.,

Penney & Spector, 2005) or supervisor abuse (e.g., Wheeler, Halbesleben, & Whitman,

2013). Specifically, by highlighting the role of the social component of social undermining, this dissertation illuminates why social undermining is potentially more pernicious and more damaging than other forms of social undermining. Additionally, recasting social undermining as a social influence process allows for the identification of the specific social and psychological mechanisms at work.

97

Second, this dissertation explicitly highlights the importance of understanding the witness’ role in social undermining. The unstated assumption in all of the social undermining literature is that the witness implicitly accepts social undermining and works to facilitate the goals of the underminer. By exploring social undermining as a social influence process, this assumption can be explored. The social influence framework of social undermining developed in this dissertation provides guidance as to what factors facilitate acceptance of social undermining and what factors facilitate rejection of social undermining. Additionally, the social influence framework of social undermining outlines social factors – such as underminer power – that may force witness’ to act in ways that are conducive to the goals of the underminer without accepting social undermining. This approach opens up a whole new avenue for the social undermining literature.

Third, this dissertation explicitly explores the witness’ role through two studies.

To my knowledge, this is the first empirical test of the witness’ response to social undermining. Leveraging a survey of real-world examples and a multi-round behavioral lab study, this dissertation highlights the mechanism through which social undermining affects the victim (i.e., through the witness). Additionally, it highlights the key process by which the witness makes sense of the social undermining event, and how a series of such events eventually shape the witness’ attitudinal, emotional, and behavioral response.

Finally, this witness extends the current understanding of the social influence literature by proposing the ramifications for a failed social influence attempt. To my knowledge, the social influence literature has focused primarily on the mechanisms of social influence and factors that increase the persuasiveness of social influence, but have

98

not explored the ramifications when an individual discovers that they were the target of social influence. By integrating the work done on in the management literature on political power with the social influence literature, this dissertation proposes that social influence can fail. Additionally, the social influence framework of social undermining provides a compelling theoretical framework for the potential detrimental outcomes to the social influencer if their actions are detected.

5.2 PRACTICAL IMPLICATIONS

Understanding social undermining as a social influence process provides several practical implications for researchers and practitioners. First, and potentially most important, this dissertation highlights the importance of researching social undermining.

Research into occurred predominantly in the 1990s and early 2000s

(e.g., Andersson & Pearson, 1999; Leymann, 1990; Neuman & Baron, 2006; Randall,

2001). A recent survey conducted by the Workplace Bullying Institute (WBI) found that

19% of US employees experienced bullying at work, 19% have directly witness bullying at work, and 63% are aware that bullying occurs in their workplace.3 According to the

WBI figures, 60.3 million US employees were affected by workplace bullying in 2017.

As workplace bullying has become identified as a problem within organizations, the growth in the body of literature has increased exponentially since the introduction of the construct by Leymann (1990), such that there have been ten comprehensive reviews

(Bartlett & Bartlett, 2011; Branch, Richards, & Dretsch, 2013; Ciby & Raya, 2015; Ståle

Einarsen, 2000; Moayed, Daraiseh, Shell, & Salem, 2006; Rai & Agarwal, 2016, 2018;

Rayner & Hoel, 1997; Samnani & Singh, 2012) and two detailed meta-analyses (Nielsen

3 See: https://www.workplacebullying.org/2017-prevalence/

99

& Einarsen, 2012; Nielsen, Matthiesen, & Einarsen, 2010) covering the past 30 years over work. The result of this extensive research has been the development of effective

HR practices, such as “zero tolerance” and “managing with respect” policies along with clear procedures on how to handle reports of bullying (Vartia et al., 2011).

While social undermining is adjacent to workplace bullying on the nomological network of workplace aggression behaviors, one of its key defining characteristics is its pernicious nature. Indeed, social undermining may be so subtle that it may be a socially acceptable manner to achieve individual success and/or promotion, especially at the top of the organization (Keeves et al., 2017). Thus, social undermining may be as prevalent, if not more prevalent, than workplace bullying. Yet, surprisingly little is known about the underling mechanisms of social undermining. I hope this dissertation provides the first steps toward shifting the from describing the phenomenon to proscribing solutions with wide reaching organizational impact.

5.3 CONCLUSION

The goal of this dissertation was to build and test theory surrounding the witness’ role in social undermining. Through the integration of theory and research from the social influence and emotions literatures and the use of cross-sectional and longitudinal studies, this dissertation provides the first step in changing the current conversation in the social undermining literature. A common call from the literature is to explore the role of the witness in social undermining as it will provide valuable insight into how to mitigate this damaging, yet common, workplace behavior (e.g., Aquino & Thau, 2009; Hershcovis,

2011). In providing a framework for future research to build upon, this dissertation is an answer to that call.

100

REFERENCES

Adler, R. S., Rosen, B., & Silverstein, E. M. (1998). Emotions in negotiation: How to

manage fear and anger. Negotiation Journal, 14(2), 161–179.

https://doi.org/10.1111/j.1571-9979.1998.tb00156.x

Agervold, M., & Mikkelsen, E. G. (2004). Relationships between bullying, psychosocial

work environment and individual stress reactions. Work and Stress, 18(4), 336–351.

https://doi.org/10.1080/02678370412331319794

Allan, S., & Gilbert, P. (2002). Anger and anger expression in relation to perceptions of

social rank, and depressive symptoms. Personality and Individual

Differences, 32(3), 551–565. https://doi.org/10.1016/S0191-8869(01)00057-5

Anderson, C., & Berdahl, J. L. (2002). The experience of power: Examining the effects

of power on approach and inhibition tendencies. Journal of Personality and Social

Psychology, 83(6), 1362–1377. https://doi.org/10.1037/0022-3514.83.6.1362

Anderson, C., & Galinsky, A. D. (2006). Power, optimism, and risk-taking. European

Journal of Social Psychology, 36(4), 511–536. https://doi.org/10.1002/ejsp.324

Andersson, L. M., & Pearson, C. M. (1999). Tit for Tat? The Spiraling Effect of Incivility

in the Workplace. Academy of Management Review, 24(3), 452–471.

https://doi.org/10.5465/amr.1999.2202131

101

Aquino, K., & Douglas, S. (2003). Identity threat and antisocial behavior in

organizations: The moderating effects of individual differences, aggressive

modeling, and hierarchical status. Organizational Behavior and Human Decision

Processes, 90(1), 195–208. https://doi.org/10.1016/S0749-5978(02)00517-4

Aquino, K., & Thau, S. (2009). Workplace Victimization: Aggression from the Target’s

Perspective. Annual Review of Psychology, 60(1), 717–741.

https://doi.org/10.1146/annurev.psych.60.110707.163703

Aquino, K., Tripp, T. M., & Bies, R. J. (2001). How employees respond to personal

offense: The effects of blame attribution, victim status, and offender status on

revenge and reconciliation in the workplace. Journal of Applied Psychology, 86(1),

52–59. https://doi.org/10.1037/0021-9010.86.1.52

Aquino, K., Tripp, T. M., & Bies, R. J. (2006). Getting even or moving on? Power,

procedural justice, and types of offense as predictors of revenge, forgiveness,

reconciliation, and avoidance in organizations. Journal of Applied Psychology,

91(3), 653–668. https://doi.org/10.1037/0021-9010.91.3.653

Aron, A., & Aron, E. (2000). Self-expansion motivation and including other in the self.

In W. Ickes & S. Duck (Eds.), The Social Psychology of Personal Relationships (pp.

109–128). New York, NY: John Wiley & Sons.

Ashforth, B. E. (2001). Role Transitions in Organizational Life: An Identity-Based

Perspective. Mahwah, NJ: Erlbaum.

Ashforth, B. E., & Mael, F. (1989). Social Identity Theory and the Organization. The

Academy of Management Review, 14(1), 20. https://doi.org/10.2307/258189

102

Ashton-James, C. E., & Ashkanasy, N. M. (2005). What Beneath? A Process

Analysis of Affective Events Theory. In N. M. Ashkanasy & W. J. Zerbe (Eds.), The

Effects of Affect In Organizational Settings: Research on Emotions in Organizations

(Vol. 1, pp. 23–46). Amsterdam: Elsevier. https://doi.org/10.1016/S1746-

9791(05)01102-8

Averill, J. R. (1973). Personal control over aversive stimuli and its relationship to stress.

Psychological Bulletin, 80(4), 286–303. https://doi.org/10.1037/h0034845

Ayoko, O. B., Callan, V. J., & Härtel, C. E. J. (2003). Workplace conflict, bullying, and

counterproductive behaviors. The International Journal of Organizational Analysis,

11(4), 283–301. https://doi.org/10.1108/eb028976

Baber, C., Mellor, B., Graham, R., Noyes, J. M., & Tunley, C. (1996). and the

use of automatic speech recognition: The effects of time and resource demands.

Speech Communication, 20(1–2), 37–53. https://doi.org/10.1016/S0167-

6393(96)00043-X

Barsade, S. G., & Gibson, D. E. (2007). Why Does Affect Matter in Organizations?

Academy of Management Perspectives, 21(1), 36–59.

https://doi.org/10.5465/amp.2007.24286163

Bartlett, J. E., & Bartlett, M. E. (2011). Workplace bullying: An integrative literature

review. Advances in Developing Human Resources, 13(1), 69–84.

https://doi.org/10.1177/1523422311410651

103

Basch, J., & Fisher, C. D. (2000). Affective events-emotions matrix: classification of

work events and associated emotions. In N. M. Ashkanasy, C. E. J. Hartel, & W. J.

Zerbe (Eds.), Emotions in the Workplace: Research, Theory and Practice (pp. 36–

48). Westport, CT: Quorum Books.

Baumeister, R. F., Zhang, L., & Vohs, K. D. (2004). Gossip as cultural learning. Review

of General Psychology, 8(2), 111–121. https://doi.org/10.1037/1089-2680.8.2.111

Beatty, M. J., & McCroskey, J. C. (1997). It’s in our nature: Verbal aggressiveness as

temperamental expression. Communication Quarterly, 45(4), 446–460.

https://doi.org/10.1080/01463379709370076

Beersma, B., & Van Kleef, G. A. (2012). Why People Gossip: An Empirical Analysis of

Social Motives, Antecedents, and Consequences. Journal of Applied Social

Psychology, 42(11), 2640–2670. https://doi.org/10.1111/j.1559-1816.2012.00956.x

Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological

Bulletin, 107(2), 238–246.

Bhattacherjee, A., & Sanford, C. (2006). Influence Processes for Information Technology

Acceptance: An Elaboration Likelihood Model. MIS Quarterly, 30(4), 805.

https://doi.org/10.2307/25148755

Bies, R. J. (2005). Are procedural justice, interactional justice conceptually distinct? In J.

Greenberg & J. Colquitt (Eds.), Handbook of Organizational Justice (pp. 85–112).

Mahwah, NJ: Erlbaum.

104

Bies, R. J., & Tripp, T. M. (2005). The study of revenge in the workplace: Conceptual,

ideological, and empirical issues. In S. Fox & P. E. Spector (Eds.),

Counterproducitve work behavior: Investigations of actors and targets (pp. 65–81).

Washington, DC: American Psychological Association.

Bliese, P. D., Maltarich, M. A., & Hendricks, J. L. (2018). Back to Basics with Mixed-

Effects Models: Nine Take-Away Points. Journal of Business and Psychology,

33(1), 1–23. https://doi.org/10.1007/s10869-017-9491-z

Bliese, P. D., & Ployhart, R. E. (2002). Growth Modeling Using Random Coefficient

Models: Model Building, Testing, and Illustrations. Organizational Research

Methods, 5(4), 362–387. https://doi.org/10.1177/109442802237116

Bodenhausen, G. V, Kramer, G. P., & Susser, K. (1994). Attitudes and social cognition

happiness and stereotypic thinking in social judgment. Journal of Personality and

Social Psychology, 66(4), 621–632. https://doi.org/10.1037/0022-3514.66.4.621

Bodrov, V. A. (2000). Study of the information stress problem in operators. Human

Physiology, 26(5), 605–611. https://doi.org/10.1007/BF02760377

Bradfield, M., & Aquino, K. (1999). The effects of blame attributions and offender

likableness on forgiveness and revenge in the workplace. Journal of Management,

25(5), 607–631. https://doi.org/10.1177/014920639902500501

Branch, K. A., Richards, T. N., & Dretsch, E. C. (2013). An Exploratory Analysis of

College Students’ Response and Reporting Behavior Regarding Intimate Partner

Violence Victimization and Perpetration Among Their Friends. Journal of

Interpersonal Violence, 28(18), 3386–3399.

https://doi.org/10.1177/0886260513504494

105

Bravo, G., & Tamburino, L. (2008). The evolution of trust in non-simultaneous exchange

situations. Rationality and Society, 20(1), 85–113.

https://doi.org/10.1177/1043463107085441

Briñol, P., Petty, R. E., Valle, C., Rucker, D. D., & Becerra, A. (2007). The Effects of

Message Recipients’ Power Before and After Persuasion: A Self-Validation

Analysis. Journal of Personality and Social Psychology, 93(6), 1040–1053.

https://doi.org/10.1037/0022-3514.93.6.1040

Broch-Due, I., Kjærstad, H. L., Kessing, L. V., & Miskowiak, K. (2018). Subtle

behavioural responses during negative emotion reactivity and down-regulation in

bipolar disorder: A facial expression and eye-tracking study. Psychiatry Research,

266(August 2017), 152–159. https://doi.org/10.1016/j.psychres.2018.04.054

Burger, J. M. (1999). The foot-in-the-door compliance procedure: A multiple-process

analysis and review. Personality and Social Psychology Review, 3(4), 303–325.

https://doi.org/10.1207/s15327957pspr0304_2

Butterfield, L. D., Borgen, W. A., Amundson, N. E., & Maglio, A.-S. T. (2005). Fifty

years of the critical incident technique: 1954-2004 and beyond. Qualitative

Research, 5(4), 475–497. https://doi.org/10.1177/1468794105056924

Byrne, B. M. (1998). Structural equation modeling with LISREL, PRELIS, and SIMPLIS.

Mahwah, NJ: Lawrence Erlbaum.

Cacioppo, J. T., & Petty, R. E. (1979). Effects of message repetition and position on

cognitive response, recall, and persuasion. Journal of Personality and Social

Psychology, 37(1), 97–109. https://doi.org/10.1037/0022-3514.37.1.97

106

Caldwell, D. F., & Burger, J. M. (1998). Personality characteristics of job applicants and

success in screening interviews. Personnel Psychology, 51(1), 119–136.

https://doi.org/10.1111/j.1744-6570.1998.tb00718.x

Callahan, D. (2004). The cheating culture: Why more Americans are doing wrong to get

ahead. Orlando, FL: Harcourt.

Campbell, E. M., Chuang, A., Liao, H., Zhou, J., & Dong, Y. (2017). Hot shots and cool

reception? An expanded view of social consequences for high performers. Journal

of Applied Psychology, 102(5), 845–866. https://doi.org/10.1037/apl0000183

Cannon, W. B. (1935). Stresses and stains of homeostasis. The American Journal of the

Medical Sciences, 189(1), 13–14. https://doi.org/10.1097/00000441-193501000-

00001

Case, C. R., & Maner, J. K. (2014). Divide and conquer: When and why leaders

undermine the cohesive fabric of their group. Journal of Personality and Social

Psychology, 107(6), 1033–1050. https://doi.org/10.1037/a0038201

Chacko, S., & Conway, N. (2019). Employee experiences of HRM through daily

affective events and their effects on perceived event‐signalled HRM system

strength, expectancy perceptions, and daily work engagement. Human Resource

Management Journal, 29(3), 433–450. https://doi.org/10.1111/1748-8583.12236

Chaiken, S. (1979). Communicator physical attractiveness and persuasion. Journal of

Personality and Social Psychology, 37(8), 1387–1397. https://doi.org/10.1037/0022-

3514.37.8.1387

107

Cheung, G. W., & Rensvold, R. B. (2001). The Effects of Model Parsimony and

Sampling Error on the Fit of Structural Equation Models. Organizational Research

Methods, 4(3), 236–264. https://doi.org/10.1177/109442810143004

Ciby, M., & Raya, R. P. (2015). Workplace Bullying: A Review of the Defining Features,

Measurement Methods and Prevalence across Continents. IIM Kozhikode Society &

Management Review, 4(1), 38–47. https://doi.org/10.1177/2277975215587814

Cochard, F., Van, P. N., & Willinger, M. (2004). Trusting behavior in a repeated

investment game. Journal of Economic Behavior and Organization, 55(1), 31–44.

https://doi.org/10.1016/j.jebo.2003.07.004

Cohen-Charash, Y. (2009). Episodic envy. Journal of Applied Social Psychology, 39(9),

2128–2173. https://doi.org/10.1111/j.1559-1816.2009.00519.x

Cortina, L. M., & Magley, V. J. (2003). Raising Voice, Risking Retaliation: Events

Following Interpersonal Mistreatment in the Workplace. Journal of Occupational

Health Psychology, 8(4), 247–265. https://doi.org/10.1037/1076-8998.8.4.247

Cropanzano, R. S., Dasborough, M. T., & Weiss, H. M. (2017). Affective events and the

development of leader-member exchange. Academy of Management Review, 42(2),

233–258. https://doi.org/10.5465/amr.2014.0384

Cropanzano, R. S., Weiss, H. M., Hale, J. M. S., & Reb, J. (2003). The Structure of

Affect: Reconsidering the Relationship Between Negative and Positive Affectivity.

Journal of Management, 29(6), 831–857. https://doi.org/10.1016/S0149-

2063(03)00081-3

108

Crossley, C. D. (2009). Emotional and behavioral reactions to social undermining: A

closer look at perceived offender motives. Organizational Behavior and Human

Decision Processes, 108(1), 14–24. https://doi.org/10.1016/j.obhdp.2008.06.001

Deffenbacher, J. L., Oetting, E. R., Lynch, R. S., & Morris, C. D. (1996). The expression

of anger and its consequences. Behaviour Research and Therapy, 34(7), 575–590.

https://doi.org/10.1016/0005-7967(96)00018-6

DeMarzo, P. M., Vayanos, D., & Zwiebel, J. (2003). Persuasion Bias, Social Influence,

and Unidimensional Opinions. The Quarterly Journal of Economics, 118(3), 909–

968. https://doi.org/10.1162/00335530360698469

Denson, T. F., Pedersen, W. C., Friese, M., Hahm, A., & Roberts, L. (2011).

Understanding impulsive aggression: Angry rumination and reduced self-control

capacity are mechanisms underlying the provocation-aggression relationship.

Personality and Social Psychology Bulletin, 37(6), 850–862.

https://doi.org/10.1177/0146167211401420

Douglas, S. C., Kiewitz, C., Martinko, M. J., Harvey, P., Kim, Y., & Chun, J. U. (2008).

Cognitions, Emotions, and Evaluations: An Elaboration Likelihood Model for

Workplace Aggression. Academy of Management Review, 33(2), 425–451.

https://doi.org/10.5465/amr.2008.31193490

Dubreuil, B. (2010). Punitive emotions and norm violations. Philosophical Explorations,

13(1), 35–50. https://doi.org/10.1080/13869790903486776

Dubrin, A. J. (1991). Sex and Gender Differences in Tactics of Influence. Psychological

Reports, 68(2), 635–646. https://doi.org/10.2466/pr0.1991.68.2.635

109

Duffy, M. K., Ganster, D. C., & Pagon, M. (2002). Social undermining in the workplace.

Academy of Management Journal, 45(2), 331–351. https://doi.org/10.2307/3069350

Duffy, M. K., Ganster, D. C., Shaw, J. D., Johnson, J. L., & Pagon, M. (2006). The social

context of undermining behavior at work. Organizational Behavior and Human

Decision Processes, 101, 105–126. https://doi.org/10.1016/j.obhdp.2006.04.005

Duffy, M. K., Scott, K. L., Shaw, J. D., Tepper, B. J., & Aquino, K. (2012). A Social

Context Model of Envy and Social Undermining. Academy of Management Journal,

55(3), 643–666. https://doi.org/10.5465/amj.2009.0804

Dunbar, R. I. M. (2004). Gossip in evolutionary perspective. Review of General

Psychology, 8(2), 100–110. https://doi.org/10.1037/1089-2680.8.2.100

Dundon, T. (2002). Employer opposition and union avoidance in the UK. Industrial

Relations Journal, 33(3), 234–245. https://doi.org/10.1111/1468-2338.00232

Dunn, J. R., & Schweitzer, M. (2006). Geen and mean: Envy and social undermining in

organizations. Research on Managing Groups and Teams: Ethics in Groups, 8, 177–

197.

Dupré, K. E., Inness, M., Connelly, C. E., Barling, J., & Hoption, C. (2006). Workplace

aggression in teenage part-time employees. Journal of Applied Psychology, 91(5),

987–997. https://doi.org/10.1037/0021-9010.91.5.987

Einarsen, S., & Skogstad, A. (1996). Bullying at work: Epidemiological findings in

public and private organizations. European Journal of Work and Organizational

Psychology, 5, 185–201.

110

Einarsen, Ståle. (2000). and bullying at work: A review of the Scandinavian

approach. Aggression and Violent Behavior, 5(4), 379–401.

https://doi.org/10.1016/S1359-1789(98)00043-3

Einarsen, Ståle, Raknes, B. I., & Matthiesen, S. B. (1994). Bullying and harassment at

work and their relationships to work environment quality: An exploratory study.

European Work and Organizational Psychologist, 4, 381–401.

Eissa, G., Chinchanachokchai, S., & Wyland, R. (2017). The Influence of Supervisor

Undermining on Self-Esteem, Creativity, and Overall Job Performance: A Multiple

Mediation Model. Organization Management Journal, 14(4), 185–197.

https://doi.org/10.1080/15416518.2017.1382321

Ekman, P. (1992). Are there basic emotions? Psychological Review, 99(3), 550–553.

https://doi.org/10.1037/0033-295X.99.3.550

Ekman, P. (1999). Basic Emotions. In T. Dagleish & M. J. Power (Eds.), Handbook of

Cognition and Emotion (pp. 45–60). New York, NY: Wiley.

Ekman, P. (2006). Darwin, Deception, and Facial Expression. Annals of the New York

Academy of Sciences, 1000(1), 205–221. https://doi.org/10.1196/annals.1280.010

Ekman, P., & Friesen, W. V. (1978). The facial action coding system. Palo Alto, CA:

Consulting Psychologists Press.

Elfenbein, H. A. (2007). Emotion in Organizations: A Review in Stages. Academy of

Management, 1(1), 315–386. Retrieved from

https://cloudfront.escholarship.org/dist/prd/content/qt2bn0n9mv/qt2bn0n9mv.pdf

111

Ellsworth, P. C., & Scherer, K. R. (2003). Appraisal processes in emotion. In R. J.

Davidson, K. R. Scherer, & H. H. Goldsmith (Eds.), Handbook of Affective Sciences

(pp. 572–595). Oxford University Press.

Ellwardt, L., Labianca, G. J., & Wittek, R. (2012). Who are the objects of positive and

negative gossip at work?. A social network perspective on workplace gossip. Social

Networks, 34(2), 193–205. https://doi.org/10.1016/j.socnet.2011.11.003

Erber, J. T., & Prager, I. G. (2000). Age and excuses for forgetting: Self-handicapping

versus damage-control strategies. International Journal of Aging and Human

Development, 50(3), 201–214. https://doi.org/10.2190/XFJY-P3R6-7Y2X-FX3M

Ferrin, D. L., Bligh, M. C., & Kohles, J. C. (2008). It takes two to tango: An

interdependence analysis of the spiraling of perceived trustworthiness and

cooperation in interpersonal and intergroup relationships. Organizational Behavior

and Human Decision Processes, 107(2), 161–178.

https://doi.org/10.1016/j.obhdp.2008.02.012

Ferris, D. L., Yan, M., Lim, V. K. G., Chen, Y., & Fatimah, S. (2016). An approach-

avoidance framework of workplace aggression. Academy of Management Journal,

59(5), 1777–1800. https://doi.org/10.5465/amj.2014.0221

Ferris, G. R., Anthony, W. P., Kolodinsky, R. W., Gilmore, D. C., & Harvey, M. G.

(2002). Development of political skill. In C. Wankel & R. DeFillippi (Eds.),

Research in management education and development, Volume 1: Rethinking

management education for the 21st century (pp. 3–25). Greenwich, CT: Information

Age Publishing.

112

Festinger, L. (1953). An analysis of compliant behaviour. In M. Sherif & M. O. Wilson

(Eds.), Group relations at the crossroads (pp. 232–256). New York, NY: Harper &

Bros.

Festinger, L. (1954). A Theory of Social Comparison Processes. Human Relations, 7(2),

117–140. https://doi.org/10.1177/001872675400700202

Fischbacher, U. (2007). z-Tree : Zurich toolbox for ready-made economic experiments.

Experimental Economics, 10(2), 171–178. https://doi.org/10.1007/s10683-006-

9159-4

Fischer, A. H., & Giner-Sorolla, R. (2016). Contempt: Derogating Others while Keeping

Calm. Emotion Review, 8(4), 346–357. https://doi.org/10.1177/1754073915610439

Fischer, A. H., & Roseman, I. J. (2007). Beat them or ban them: The characteristics and

social functions of anger and contempt. Journal of Personality and Social

Psychology, 93(1), 103–115. https://doi.org/10.1037/0022-3514.93.1.103

Fitness, J. (2000). Anger in the workplace: An emotion script approach to anger episodes

between workers and their superiors, co-workers and subordinates. Journal of

Organizational Behavior, 21(2), 147–162. https://doi.org/10.1002/(SICI)1099-

1379(200003)21:2<147::AID-JOB35>3.0.CO;2-T

Flanagan, J. C. (1954). The critical incident technique. Psychological Bulletin, 51(4),

327–358. https://doi.org/10.1037/h0061470

Folger, R. (1987). Reformulating the preconditions of resentment: A referent cognitions

model. In W. T. Smith & J. C. Masters (Eds.), Social comparison, social justice, and

relative deprivation: Theoretical, empirical, and policy perspectives (pp. 183–215).

Hillsdale, NJ: Erlbaum.

113

Folger, R. (1998). Fairness as a moral virtue. In M. Schminke (Ed.), Managerial ethics:

Moral management of people and processes (pp. 13–34). Mahwah, NJ: Erlbaum.

Forer, B. R. (1949). The fallacy of personal validation: a classroom demonstration of

gullibility. The Journal of Abnormal and Social Psychology, 44(1), 118–123.

https://doi.org/10.1037/h0059240

Forgas, J. P. (1995). Mood and judgment: The affect infusion model (AIM).

Psychological Bulletin, 117(1), 39–66. https://doi.org/10.1037/0033-2909.117.1.39

Forgas, J. P., & George, J. M. (2001). Affective Influences on Judgments and Behavior in

Organizations: An Information Processing Perspective. Organizational Behavior

and Human Decision Processes, 86(1), 3–34.

https://doi.org/10.1006/obhd.2001.2971

Freedman, J. I., & Fraser, S. C. (1966). Compliance Without Pressure: The foot-in-the-

door technique. Journal of Personality and Social Psychology, 4(2), 195–202.

https://doi.org/10.1037/h0025009

French, J. R. P. J. (1956). A formal theory of social power. Psychological Review1,

63(3), 181–194.

Friedkin, N. E. (1998). Social influence network theory: A sociological examination of

small group dynamics. New York, NY: Cambridge University Press.

Friedkin, N. E. (2003). Social influence network theory: Toward a science of strategic

modification of interpersonal influence systems. In Dynamic Social Network

Modeling and Analysis: Workshop Summary and Papers (pp. 1–12).

Friedkin, N. E., & Johnsen, E. C. (1999). Social influence networks and opinion change.

Advances in Group Processes, 16, 1–29.

114

Friedman, R., Anderson, C., Brett, J., Olekalns, M., Goates, N., & Lisco, C. C. (2004).

The Positive and Negative Effects of Anger on Dispute Resolution: Evidence From

Electronically Mediated Disputes. Journal of Applied Psychology, 89(2), 369–376.

https://doi.org/10.1037/0021-9010.89.2.369

Frijda, N. H. (1986). The emotions. Cambridge, UK: Cambridge University Press.

Frijda, N. H. (2007). What might emotions be? Comments on the Comments. Social

Science Information, 46(3), 433–443.

https://doi.org/10.1177/05390184070460030112

Frijda, N. H. (2009). Emotion experience and its varieties. Emotion Review, 1(3), 264–

271. https://doi.org/10.1177/1754073909103595

Frijda, N. H. (2010). Impulsive action and motivation. Biological Psychology, 84(3),

570–579. https://doi.org/10.1016/j.biopsycho.2010.01.005

Frijda, N. H., Kuipers, P., & ter Schure, E. (1989). Relations among emotion, appraisal,

and emotional action readiness. Journal of Personality and Social Psychology,

57(2), 212–228. https://doi.org/10.1037/0022-3514.57.2.212

Frijda, N. H., & Mesquita, B. (1994). The social roles and functions of emotions. In S.

Kitayama & H. R. Markus (Eds.), Emotion and culture: Empirical studies of mutual

influence (pp. 51–87). Washington, DC: American Psychological Association.

Galinsky, A. D., Gruenfeld, D. H., & Magee, J. C. (2003). From Power to Action.

Journal of Personality and Social Psychology, 85(3), 453–466.

https://doi.org/10.1037/0022-3514.85.3.453

115

Gervais, M. M., & Fessler, D. M. T. (2017). On the deep structure of social affect:

Attitudes, emotions, sentiments, and the case of “contempt.” Behavioral and Brain

Sciences, 40(2017), 1–63. https://doi.org/10.1017/S0140525X16000352

Giardini, F. (2012). Deterrence and transmission as mechanisms ensuring reliability of

gossip. Cognitive Processing, 13(SUPPL. 2), 465–475.

https://doi.org/10.1007/s10339-011-0421-0

Glasø, L., Vie, T. L., Holmdal, G. R., & Einarsen, S. (2011). An application of affective

events theory to workplace bullying: The role of emotions, trait anxiety, and trait

anger. European Psychologist, 16(3), 198–208. https://doi.org/10.1027/1016-

9040/a000026

Glomb, T. M. (2002). Workplace anger and aggression: Informing conceptual models

with data from specific encounters. Journal of Occupational Health Psychology,

7(1), 20–36. https://doi.org/10.1037/1076-8998.7.1.20

Goel, S., Bell, G. G., & Pierce, J. L. (2005). The perils of Pollyanna: Development of the

over-trust construct. Journal of Business Ethics, 58(1), 203–218.

https://doi.org/10.1007/s10551-005-1415-6

Gould, R. V, & Fernandez, R. M. (1989). Structures of Mediation : A Formal Approach

to Brokerage in Transaction Networks Published by : American Sociological

Association Stable URL : http://www.jstor.org/stable/270949 Your use of the

JSTOR archive indicates your acceptance of the Terms & Condit. Sociological

Methodology, 19(1989), 89–126.

116

Grams, W. C., & Rogers, R. W. (1990). Power and Personality: Effects of

Machiavellianism, Need for Approval, and Motivation on Use of Influence Tactics.

The Journal of General Psychology, 117(1), 71–82.

https://doi.org/10.1080/00221309.1990.9917774

Grandey, A. A., Dickter, D. N., & Sin, H. P. (2004). The customer is not always right:

Customer aggression and emotion regulation of service employees. Journal of

Organizational Behavior, 25(3), 397–418. https://doi.org/10.1002/job.252

Greenbaum, R. L., Mawritz, M. B., & Eissa, G. (2012). Bottom-line mentality as an

antecedent of social undermining and the moderating roles of core self-evaluations

and conscientiousness. Journal of Applied Psychology, 97(2), 343–359.

https://doi.org/10.1037/a0025217

Greenbaum, R. L., Mawritz, M. B., & Piccolo, R. F. (2015). When Leaders Fail to “Walk

the Talk”: Supervisor Undermining and Perceptions of Leader Hypocrisy. Journal of

Management, 41(3), 929–956. https://doi.org/10.1177/0149206312442386

Greenberg, Jerald. (1990). Organizational Justice: Yesterday, Today, and Tomorrow.

Journal of Management, 16(2), 399–432.

https://doi.org/10.1177/014920639001600208

Grigoriou, K., & Rothaermel, F. T. (2014). Structural Microfoundations of Innovation:

The Role of Relational Stars. Journal of Management, 40(2), 586–615.

https://doi.org/10.1177/0149206313513612

Gruenfeld, D. H., Inesi, M. E., Magee, J. C., & Galinsky, A. D. (2008). Power and the

Objectification of Social Targets. Journal of Personality and Social Psychology,

95(1), 111–127. https://doi.org/10.1037/0022-3514.95.1.111

117

Haidt, J. (2003). The moral emotions. In K. R. Davidson & H. H. Goldsmith (Eds.),

Handbook of Affective Sciences (pp. 852–870). Oxford, England: Oxford University

Press.

Halevy, N., Halali, E., & Zlatev, J. J. (2019). Brokerage and brokering: An integrative

review and organizing framework for third party influence. Academy of

Management Annals, 13(1), 215–239. https://doi.org/10.5465/annals.2017.0024

Hallberg, L. R. M., & Strandmark, M. K. (2006). Health consequences of workplace

bullying: Experiences from the perspective of employees in the public service

sector. International Journal of Qualitative Studies on Health and Well-Being, 1(2),

109–119. https://doi.org/10.1080/17482620600555664

Hareli, S., & Rafaeli, A. (2008). Emotion cycles: On the social influence of emotion in

organizations. Research in Organizational Behavior, 28, 35–59.

https://doi.org/10.1016/j.riob.2008.04.007

Harris, K. J., Zivnuska, S., Kacmar, K. M., & Shaw, J. D. (2007). The impact of political

skill on impression management effectiveness. Journal of Applied Psychology,

92(1), 278–285. https://doi.org/10.1037/0021-9010.92.1.278

Haslam, N., & Loughnan, S. (2014). Dehumanization and Infrahumanization. Annual

Review of Psychology, 65(1), 399–423. https://doi.org/10.1146/annurev-psych-

010213-115045

Hauge, L. J., Skogstad, A., & Einarsen, S. (2009). Individual and situational predictors of

workplace bullying: Why do perpetrators engage in the bullying of others? Work

and Stress, 23(4), 349–358. https://doi.org/10.1080/02678370903395568

118

Hershcovis, M. S. (2011). “Incivility, social undermining, bullying…oh my!”: A call to

reconcile constructs within workplace aggression research. Journal of

Organizational Behavior, 32(3), 499–519. https://doi.org/10.1002/job.689

Hertel, G., & Kerr, N. L. (2001). Priming in-group favoritism: The impact of normative

scripts in the minimal group paradigm. Journal of Experimental Social Psychology,

37(4), 316–324. https://doi.org/10.1006/jesp.2000.1447

Hinde, R. A. (1997). Relationships a Dialectical Prespective. East Sussex, UK:

Psychology Press.

Hogan, R., & Blickle, G. (2013). Socioanalytic Theory. In Handbook of Personality at

Work (pp. 53–70). New York, NY: Routledge.

Hogh, A., & Dofradottir, A. (2001). Coping with bullying in the workplace. European

Journal of Work and Organizational Psychology, 10(4), 485–495.

https://doi.org/10.1080/13594320143000825

Hsee, C. K., Hatfield, E., Carlson, J. G., & Chemtob, C. (1990). The Effect of Power on

Susceptibility to Emotional Contagion. Cognition and Emotion, 4(4), 327–340.

https://doi.org/10.1080/02699939008408081

Huseynov, S., Kassas, B., Segovia, M. S., & Palma, M. A. (2019). Incorporating

biometric data in models of consumer choice. Applied Economics, 51(14), 1514–

1531. https://doi.org/10.1080/00036846.2018.1527460

Izard, C. E. (1993). Organizational and motivational functions of discrete emotions. In M.

Lewis & J. M. Haviland (Eds.), Handbook of Emotions (pp. 631–641). New York,

NY: Guilford Press.

119

Izard, C. E., Libero, D. Z., Priscilla, P., & Mauric, H. O. (1993). Stability of emotion

experiences and their relations to traits of personality. Journal of Personality and

Social Psychology, 64(5), 847–860.

Jennifer, D., Cowie, H., & Ananiadou, K. (2003). Perceptions and Experience of

Workplace Bullying in Five Different Working Populations. Aggressive Behavior,

29(6), 489–496. https://doi.org/10.1002/ab.10055

Jockin, V., Arvey, R. D., & McGue, M. (2001). Perceived victimization moderates self-

reports of workplace aggression and conflict. Journal of Applied Psychology, 86(6),

1262–1269. https://doi.org/10.1037/0021-9010.86.6.1262

Jones, S. L., & Shah, P. P. (2016). Diagnosing the locus of trust: A temporal perspective

for trustor, trustee, and dyadic influences on perceived trustworthiness. Journal of

Applied Psychology, 101(3), 392–414. https://doi.org/10.1037/apl0000041

Kaplan, S., Milde, J., & Cowan, R. S. (2017). Symbiont practices in boundary spanning:

Bridging the cognitive and political divides in interdisciplinary research. Academy of

Management Journal, 60(4), 1387–1414. https://doi.org/10.5465/amj.2015.0809

Keashly, L., Trott, V., & MacLean, L. M. (1994). Abusive behavior in the workplace: A

preliminary investigation. Violence and Victims, 9(4), 341–357.

https://doi.org/10.1891/0886-6708.9.4.341

Keeves, G. D., Westphal, J. D., & McDonald, M. L. (2017). Those Closest Wield the

Sharpest Knife: How Leads to Resentment and Social Undermining of

the CEO. Administrative Science Quarterly (Vol. 62).

https://doi.org/10.1177/0001839216686053

120

Keltner, D., & Gross, J. J. (1999). Functional accounts of emotions. Cognition and

Emotion, 13(5), 467–480. https://doi.org/10.1080/026999399379140

Keltner, D., & Haidt, J. (1999). Social functions of emotions at four levels of analysis.

Cognition and Emotion, 13(5), 505–521. https://doi.org/10.1080/026999399379168

Keltner, D., Young, R. C., & Buswell, B. N. (1997). Appeasement in human emotion,

social practice, and personality. Aggressive Behavior, 23(5), 359–374.

https://doi.org/10.1002/(SICI)1098-2337(1997)23:5<359::AID-AB5>3.0.CO;2-D

Kiewitz, C., Restubog, S. L. D., Shoss, M. K., Garcia, P. R. J. M., & Tang, R. L. (2016).

Suffering in silence: Investigating the role of fear in the relationship between

abusive supervision and defensive silence. Journal of Applied Psychology, 101(5),

731–742. https://doi.org/10.1037/apl0000074

Kim, E., & Glomb, T. M. (2014). Victimization of high performers: The roles of envy

and work group identification. Journal of Applied Psychology, 99(4), 619–634.

https://doi.org/10.1037/a0035789

King-Casas, B., Tomlin, D., Anen, C., Camerer, C. F., Quartz, S. R., & Montague, P. R.

(2005). Getting to know you: Reputation and trust in a two-person economic

exchange. Science, 308(5718), 78–83. https://doi.org/10.1126/science.1108062

Kipnis, D. (1972). Does power corrupt? Journal of Personal and Social Psychology,

24(1), 33–41. https://doi.org/10.1080/01900692.2018.1506934

Kivimäki, M., Virtanen, M., Vartia, M., Elovainio, M., Vahtera, J., & Keltikangas-

Järvinen, L. (2003). Workplace bullying and the risk of cardiovascular disease and

depression. Occupational and Environmental Medicine, 60(10), 779–783.

https://doi.org/10.1136/oem.60.10.779

121

Kniffin, K. M., & Wilson, D. S. (2005). Utilities of gossip across organizational levels:

Multilevel selection, free-riders, and teams. Human Nature, 16(3), 278–292.

https://doi.org/10.1007/s12110-005-1011-6

Krehbiel, P. J., & Cropanzano, R. (2000). Procedural justice, outcome favorability and

emotion. Social Justice Research, 13(4), 339–360.

https://doi.org/10.1023/A:1007670909889

Kuppens, P., Van Mechelen, I., Smits, D. J. M., & De Boeck, P. (2003). The appraisal

basis of anger: Specificity, necessity and sufficiency of components. Emotion, 3(3),

254–269. https://doi.org/10.1037/1528-3542.3.3.254

Kurland, N. B., & Pelled, L. H. (2000). Passing the Word: Toward a Model of Gossip and

Power in the Workplace. The Academy of Management Review, 25(2), 428.

https://doi.org/10.2307/259023

Laham, S. M., Chopra, S., Lalljee, M., & Parkinson, B. (2010). Emotional and

behavioural reactions to moral transgressions: Cross-cultural and individual

variations in India and Britain. International Journal of Psychology, 45(1), 64–71.

https://doi.org/10.1080/00207590902913434

Lahno, B. (1995). Trust, Reputation, And Exit in Exchange Relationships. Journal of

Conflict Resolution, 39(3), 495–510. https://doi.org/10.1177/0022002795039003005

Lam, C. K., Van der Vegt, G. S., Walter, F., & Huang, X. (2011). Harming high

performers: A social comparison perspective on interpersonal harming in work

teams. Journal of Applied Psychology, 96(3), 588–601.

https://doi.org/10.1037/a0021882

122

Lanaj, K., & Jennings, R. E. (2019). Putting leaders in a bad mood: The affective costs of

helping followers with personal problems. Journal of Applied Psychology, 105(4),

355–371. https://doi.org/10.1037/apl0000450

Larrimore, L., Jiang, L., Larrimore, J., Markowitz, D., & Gorski, S. (2011). Peer to Peer

Lending: The Relationship Between Language Features, Trustworthiness, and

Persuasion Success. Journal of Applied Communication Research, 39(1), 19–37.

https://doi.org/10.1080/00909882.2010.536844

Lazarus, R. S. (1991). Cognition and motivation in emotion. American Psychologist,

46(4), 352–367. https://doi.org/10.1037/0003-066X.46.4.352

Lazarus, R. S., & Folkman, S. (1984). Stress, Appraisal, and Coping. New York, NY:

Springer.

Lazarus, R. S., & Lazarus, B. N. (1994). Passion and Reason: Making Sense of our

Emotions. New York, NY: Oxford University Press.

Lebel, R. D. (2017). Moving Beyond Fight and Flight: A Contingent Model of How the

Emotional Regulation of Anger and Fear Sparks Proactivity. Academy of

Management Review, 42(2), 190–206. https://doi.org/10.5465/amr.2014.0368

LeDoux, J. (1996). Emotional networks and motor control: a fearful view. In Progress in

brain research (pp. 437–446). Elsevier.

Lee, K. Y., Kim, E., Bhave, D. P., & Duffy, M. K. (2016). Why victims of undermining

at work become perpetrators of undermining: An integrative model. Journal of

Applied Psychology, 101(6), 915–924. https://doi.org/10.1037/apl0000092

123

Lee, R., & Brotheridge, C. (2006). When prey turns predatory: Workplace bullying as a

predictor of counteraggression/bullying, coping, and well-being. European Journal

of Work and Organizational Psychology, 15(3), 352–377.

https://doi.org/10.1080/13594320600636531

Lemyre, L., & Smith, P. M. (1985). Intergroup discrimination and self-esteem in the

minimal group paradigm. Journal of Personality and Social Psychology, 49(3), 660–

670. https://doi.org/10.1037//0022-3514.49.3.660

Lerner, J. S., & Keltner, D. (2001). Fear, anger, and risk. Journal of Personality and

Social Psychology, 81(1), 146–159. https://doi.org/10.1037/0022-3514.81.1.146

Levenson, H. (1981). Differentiating among internality, powerful others, and chance. In

H. M. Lefcourt (Ed.), Research with the locus of control construct: Vol. 1.

Assesment methods (pp. 15–63). New York, NY: Academic Press.

Leventhal, H. (1970). Findings and theory in the study of fear communications. Advances

in Experimental Social Psychology, 5, 119–186.

Leventhal, H. (1971). Fear appeals and persuasion: the differentiation of a motivational

construct. American Journal of Public Health, 61(6), 1208–1224.

https://doi.org/10.2105/AJPH.61.6.1208

Levinson, H. (1970). Management by whose objectives? Harvard Business Review, 48,

125–134.

Lewicki, R. J., & Bunker, B. B. (1996). Developing and maintaining trust in work

relationships. In R. M. Kramer & T. R. Tyler (Eds.), Trust in organizations:

Frontiers of theory and research (pp. 114–139). Thousand Oaks, CA: Sage.

124

Lewicki, R. J., & Sheppard, B. H. (1985). Choosing how to intervene: Factors affecting

the use of process and outcome control in third party dispute resolution. Journal of

Organizational Behavior, 6(1), 49–64. https://doi.org/10.1002/job.4030060105

Lewis, S. E., & Orford, J. (2005). Women’s experiences of workplace bullying: Changes

in social relationships. Journal of Community and Applied Social Psychology, 15(1),

29–47. https://doi.org/10.1002/casp.807

Leymann, H. (1990). and psychological terror at . Violence and

Victims, 5(2), 119–126. https://doi.org/10.1891/0886-6708.5.2.119

Li, J. J., Chen, X. P., Kotha, S., & Fisher, G. (2017). Catching fire and spreading it: A

glimpse into displayed entrepreneurial passion in crowdfunding campaigns. Journal

of Applied Psychology, 102(7), 1075–1090. https://doi.org/10.1037/apl0000217

Lieberman, M. D., & Eisenberger, N. I. (2009). Pains and Pleasures of Social Life.

Science, 323(5916), 890–891. https://doi.org/10.1126/science.1170008

Lingo, E. L., & O’Mahony, S. (2010). Nexus work: Brokerage on creative projects.

Administrative Science Quarterly, 55(1), 47–81.

https://doi.org/10.2189/asqu.2010.55.1.47

Lowe, R., & Ziemke, T. (2011). The feeling of action tendencies: On the emotional

regulation of goal-directed behavior. Frontiers in Psychology, 2(DEC), 1–24.

https://doi.org/10.3389/fpsyg.2011.00346

MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power analysis and

determination of sample size for covariance structure modeling. Psychological

Methods, 1(2), 130–149. https://doi.org/10.1037/1082-989X.1.2.130

125

Mackie, D. M., Devos, T., & Smith, E. R. (2000). Intergroup emotions: explaining

offensive action tendencies in an intergroup context. Journal of Personality and

Social Psychology, 79(4), 602–616. https://doi.org/10.1037/0022-3514.79.4.602

McAllister, C. P., Ellen, B. P., & Ferris, G. R. (2018). Social influence opportunity

recognition, evaluation, and capitalization: Increased theoretical specification

through political skill’s dimensional dynamics. Journal of Management, 44(5),

1926–1952. https://doi.org/10.1177/0149206316633747

Mikula, G., Scherer, K. R., & Athenstaedt, U. (1998). The Role of Injustice in the

Elicitation of Differential Emotional Reactions. Personality and Social Psychology

Bulletin, 24(7), 769–783. https://doi.org/10.1177/0146167298247009

Mitchell, M. S., & Ambrose, M. L. (2007). Abusive Supervision and Workplace

Deviance and the Moderating Effects of Negative Reciprocity Beliefs. Journal of

Applied Psychology, 92(4), 1159–1168. https://doi.org/10.1037/0021-

9010.92.4.1159

Mittal, V., & Ross, W. T. (1998). The Impact of Positive and Negative Affect and Issue

Framing on Issue Interpretation and Risk Taking. Organizational Behavior and

Human Decision Processes, 76(3), 298–324.

https://doi.org/10.1006/obhd.1998.2808

Moayed, F. A., Daraiseh, N., Shell, R., & Salem, S. (2006). Workplace bullying: A

systematic review of risk factors and outcomes. Theoretical Issues in Ergonomics

Science, 7(3), 311–327. https://doi.org/10.1080/14639220500090604

126

Mohr, J. J., Markell, H. M., King, E. B., Jones, K. P., Peddie, C. I., & Kendra, M. S.

(2019). Affective antecedents and consequences of revealing and concealing a

lesbian, gay, or bisexual identity. Journal of Applied Psychology, 104(10), 1266–

1282. https://doi.org/10.1037/apl0000399

Moller, A. C., & Deci, E. L. (2010). Interpersonal control, dehumanization, and violence:

A self-determination theory perspective. Group Processes and Intergroup Relations,

13(1), 41–53. https://doi.org/10.1177/1368430209350318

Morris, M. W., & Keltner, D. (2000). How Emotions Work: The Social Functions of

Emotional Expression in Negotiations. Research in Organizational Behavior, 22(c),

1–50. https://doi.org/10.1016/S0191-3085(00)22002-9

Nakashima, N. A., Halali, E., & Halevy, N. (2017). Third parties promote cooperative

norms in repeated interactions. Journal of Experimental Social Psychology, 68, 212–

223. https://doi.org/10.1016/j.jesp.2016.06.007

Neuman, J. H., & Baron, R. A. (2006). Aggression in the Workplace: A Social-

Psychological Perspective. In Counterproductive work behavior: Investigations of

actors and targets. (pp. 13–40). Washington: American Psychological Association.

https://doi.org/10.1037/10893-001

Nielsen, M. B., & Einarsen, S. (2012). Outcomes of exposure to workplace bullying: A

meta-analytic review. Work and Stress, 26(4), 309–332.

https://doi.org/10.1080/02678373.2012.734709

127

Nielsen, M. B., Matthiesen, S. B., & Einarsen, S. (2010). The impact of methodological

moderators on prevalence rates of workplace bullying. A meta-analysis. Journal of

Occupational and Organizational Psychology, 83(4), 955–979.

https://doi.org/10.1348/096317909X481256

O’Reilly, J., & Aquino, K. (2011). A model of third parties’ morally motivated responses

to mistreatment in organizations. Academy of Management Review, 36(3), 526–543.

https://doi.org/10.5465/AMR.2011.61031810

Oatley, K., & Johnson-Laird, P. N. (1995). The communicative theory of emotions:

Empirical tests, mental models, and implications for social interactions. In L. L.

Martin & A. Tesser (Eds.), Goals and affect (pp. 363–393). Hillsdale, NJ:

Lawerence Erlbaum Associates.

Obstfeld, D. (2017). Getting new things done: Netowrks, brokerage, and the assembly of

innovative action. Stanford University Press.

Obstfeld, D., Borgatti, S. P., & Davis, J. (2014). Brokerage as a process: Decoupling third

party action from social network structure. Research in the Sociology of

Organizations, 40(July), 135–159. https://doi.org/10.1108/S0733-

558X(2014)0000040007

Ostrom, E. (1998). A Behavioral Approach to the Rational Choice Theory of Collective

Action: Presidential Address, American Political Science Association, 1997.

American Political Science Review, 92(1), 1–22. https://doi.org/10.2307/2585925

Overbeck, J. R., & Park, B. (2001). When power does not corrupt: Superior individuation

processes among powerful perceivers. Journal of Personality and Social

Psychology, 81(4), 549–565. https://doi.org/10.1037/0022-3514.81.4.549

128

Penney, L. M., & Spector, P. E. (2005). Job stress, incivility, and counterproductive work

behavior (CWB): The moderating role of . Journal of

Organizational Behavior, 26(7), 777–796. https://doi.org/10.1002/job.336

Petty, R. E., & Cacioppo, J. T. (1986). The Elaboration Likelihood Model of Persuasion.

In Journal of Applied Communications (Vol. 94, pp. 123–205).

https://doi.org/10.1016/S0065-2601(08)60214-2

Petty, R. E., Cacioppo, J. T., & Goldman, R. (1981). Personal involvement as a

determinant of argument-based persuasion. Journal of Personality and Social

Psychology, 41(5), 847–855. https://doi.org/10.1037//0022-3514.41.5.847

Petty, R. E., Cacioppo, J. T., Strathman, A. J., & Priester, J. R. (2005). To think or not to

think: Exploring two routes to persuasion. In T. C. Brock & M. C. Green (Eds.),

Persuasion: Psychological insights and perspectives (pp. 81–116). SAGE

Publications, Inc.

Petty, R. E., Wegener, D. T., & Fabrigar, L. R. (1997). Attitudes and attitude change.

Annual Review of Psychology, 48(1), 609–647.

https://doi.org/10.1146/annurev.psych.48.1.609

Pinheiro, J. C., & Bates, D. M. (2000). Mixed-effects models in S and S-PLUS. New

York, NY: Springer-Verlag.

Porath, C. L., & Erez, A. (2007). Does really matter? The effects of rudeness on

task performance and helpfulness. Academy of Management Journal, 50(5), 1181–

1197. https://doi.org/10.2307/20159919

129

Porath, C. L., & Erez, A. (2009). Overlooked But Not Untouched: How Rudeness

Reduces Onlookers’ Performance on Routine and Creative Tasks. Organizational

Behavior and Human Decision Processes, 109(1), 29–44.

https://doi.org/10.1016/j.obhdp.2009.01.003

Porter, C. O. L. H., Outlaw, R., Gale, J. P., & Cho, T. S. (2019). The Use of Online Panel

Data in Management Research: A Review and Recommendations. Journal of

Management, 45(1), 319–344. https://doi.org/10.1177/0149206318811569

Posner, E. A., Spier, K. E., & Vermeule, A. (2010). Divide and Conquer. Journal of

Legal Analysis, 2(2), 417–471. https://doi.org/10.1093/jla/2.2.417

Quine, L. (2001). Workplace bullying in nurses. Journal of Health Psychology, 6(1), 73–

84. https://doi.org/10.1177/135910530100600106

Quintane, E., & Carnabuci, G. (2016). How do brokers broker? Tertius gaudens, tertius

iungens, and the temporality of structural holes. Organization Science, 27(6), 1343–

1360. https://doi.org/10.1287/orsc.2016.1091

Rai, A., & Agarwal, U. (2016). Workplace Bullying: A Review and Future Research

Directions. South Asian Journal of Management, 23(3), 27–56.

Rai, A., & Agarwal, U. A. (2018). Workplace bullying and employee silence: A

moderated mediation model of psychological contract violation and workplace

friendship. Personnel Review (Vol. 47). https://doi.org/10.1108/PR-03-2017-0071

Randall, P. (2001). Bullying in Adulthood: Assessing the Bullies and Their Victims. New

York, NY: Brunner-Routledge.

Rayner, C., & Hoel, H. (1997). A summary review of literature relating to workplace

bullying. Journal of Community and Applied Social Psychology, 7(3), 181–191.

130

Reeve, J. (2014). Understanding motivation and emotion. John Wiley & Sons.

Reh, S., Tröster, C., & Van Quaquebeke, N. (2018). Keeping (future) rivals down:

Temporal social comparison predicts coworker social undermining via future status

threat and envy. Journal of Applied Psychology, 103(4), 399–415.

https://doi.org/10.1037/apl0000281

Rogers, R. W. (1975). A protection motivation theory of fear appears and attitude change.

The Journal of Psychology, 91(1), 93–114.

Roseman, I. J. (2013). Appraisal in the emotion system: Coherence in strategies for

coping. Emotion Review, 5(2), 141–149. https://doi.org/10.1177/1754073912469591

Roseman, I. J., Copeland, J. A., & Fischer, A. H. (2003). Contempt versus anger in

interracial attidues. In Paper presented at the fourth meeting of the Society for

Personality and Social Psychology. Los Angeles.

Roseman, I. J., Wiest, C., & Swartz, T. S. (1994). Phenomenology, behaviors, and goals

differentiate discrete emotions. Journal of Personality and Social Psychology, 67(2),

206–221. https://doi.org/10.1037/0022-3514.67.2.206

Rozin, P., Lowery, L., Imada, S., & Haidt, J. (1999). The CAD triad hypothesis: A

mapping between the other-directed moral emotions, disgust, contempt and anger

and Shweder’s three universal moral codes. Journal of Personality and Social

Psychology, 76(4), 574–586. https://doi.org/10.1037/0022-3514.76.4.574

Rucker, D. D., & Galinsky, A. D. (2009). Conspicuous consumption versus utilitarian

ideals: How different levels of power shape consumer behavior. Journal of

Experimental Social Psychology, 45(3), 549–555.

https://doi.org/10.1016/j.jesp.2009.01.005

131

Sachdev, I., & Bourhis, R. Y. (1985). Social categorization and power differentials in

group relations. European Journal of Social Psychology, 15(4), 415–434.

https://doi.org/10.1002/ejsp.2420150405

Salin, D. (2003). Bullying and organisational politics in competitive and rapidly changing

work environments. International Journal of Management and Decision Making,

4(1), 35–46. https://doi.org/10.1504/IJMDM.2003.002487

Samnani, A. K., & Singh, P. (2012). 20 Years of workplace bullying research: A review

of the antecedents and consequences of bullying in the workplace. Aggression and

Violent Behavior, 17(6), 581–589. https://doi.org/10.1016/j.avb.2012.08.004

Schat, A. C. H., & Kelloway, E. K. (2003). Reducing the Adverse Consequences of

Workplace Aggression and Violence: The Buffering Effects of Organizational

Support. Journal of Occupational Health Psychology, 8(2), 110–122.

https://doi.org/10.1037/1076-8998.8.2.110

Schmid Mast, M., Jonas, K., & Hall, J. A. (2009). Give a Person Power and He or She

Will Show Interpersonal Sensitivity: The Phenomenon and Its Why and When.

Journal of Personality and Social Psychology, 97(5), 835–850.

https://doi.org/10.1037/a0016234

Schwarz, N., & Clore, G. L. (2003). Mood as Information: 20 Years Later. Psychological

Inquiry, 14(3–4), 296–303. https://doi.org/10.1080/1047840X.2003.9682896

Shapiro, D. L., & Brett, J. M. (1993). Comparing three processes underlying judgments

of procedural justice: A field study of mediation and arbitration. Journal of

Personality and Social Psychology, 65(6), 1167–1177.

https://doi.org/10.1037//0022-3514.65.6.1167

132

Sheppard, B. H., Lewicki, R. J., & Minton, J. W. (1992). Organizational justice: The

search for fairness in the workplace. New York, NY: Lexington Books.

Shweder, R. A. (1993). Everything You Ever Wanted to Know About Cognitive

Appraisal Theory Without Being Conscious of It. Psychological Inquiry, 4(4), 322–

342. https://doi.org/10.1207/s15327965pli0404_17

Simmel, G. (1950). The sociology of George Simmel. Ney York, NY: Free Press.

Skarlicki, D. P., & Folger, R. (1997). Retaliation in the workplace: The roles of

distributive, procedural, and interactional justice. Journal of Applied Psychology,

82(3), 434–443. https://doi.org/10.1037/0021-9010.82.3.434

Skarlicki, D. P., & Rupp, D. E. (2010). Dual processing and organizational justice: The

role of rational versus experiential processing in third-party reactions to workplace

mistreatment. Journal of Applied Psychology, 95(5), 944–952.

https://doi.org/10.1037/a0020468

Skogstad, A., Einarsen, S., Torsheim, T., Aasland, M. S., & Hetland, H. (2007). The

destructiveness of laissez-faire leadership behavior. Journal of Occupational Health

Psychology, 12(1), 80–92. https://doi.org/10.1037/1076-8998.12.1.80

Sluss, D. M., & Ashforth, B. E. (2007). Relational identity and identification: Defining

ourselves through work relationships. Academy of Management Review, 32(1), 9–

32. https://doi.org/10.5465/AMR.2007.23463672

Sluss, D. M., & Ashforth, B. E. (2008). How relational and organizational identification

converge: Processes and conditions. Organization Science, 19(6), 807–823.

https://doi.org/10.1287/orsc.1070.0349

133

Sluss, D. M., Ployhart, R. E., Cobb, M. G., & Ashforth, B. E. (2012). Generalizing

Newcomers’ Relational and Organizational Identifications: Processes and

Prototypicality. Academy of Management Journal, 55(4), 949–975.

https://doi.org/10.5465/amj.2010.0420

Smith, R. H., & Kim, S. H. (2007). Comprehending envy. Psychological Bulletin, 133(1),

46–64. https://doi.org/10.1037/0033-2909.133.1.46

Smith, V. L., & Ellsworth, P. C. (1987). The Social Psychology of Eyewitness Accuracy:

Misleading Questions and Communicator Expertise. Journal of Applied Psychology,

72(2), 294–300. https://doi.org/10.1037/0021-9010.72.2.294

Smits, D. J. M., & De Boeck, P. (2007). From anger to verbal aggression: Inhibition at

different levels. Personality and Individual Differences, 43(1), 47–57.

https://doi.org/10.1016/j.paid.2006.11.006

Soda, G., Tortoriello, M., & Iorio, A. (2018). Harvesting value from brokerage:

Individual strategic orientation, structural holes, and performance. Academy of

Management Journal, 61(3), 896–918. https://doi.org/10.5465/amj.2016.0123

Sommerfeld, R. D., Krambeck, H. J., & Milinski, M. (2008). Multiple gossip statements

and their effect on reputation and trustworthiness. Proceedings of the Royal Society

B: Biological Sciences, 275(1650), 2529–2536.

https://doi.org/10.1098/rspb.2008.0762

Stöckli, S., Schulte-Mecklenbeck, M., Borer, S., & Samson, A. C. (2018). Facial

expression analysis with AFFDEX and FACET: A validation study. Behavior

Research Methods, 50(4), 1446–1460. https://doi.org/10.3758/s13428-017-0996-1

134

Struthers, C. W., Dupuis, R., & Eaton, J. (2005). Promoting forgiveness among Co-

workers following a workplace transgression: The effects of social motivation

training. Canadian Journal of Behavioural Science, 37(4), 299–308.

https://doi.org/10.1037/h0087264

Tafrate, R. C., Kassinove, H., & Dundin, L. (2002). Anger episodes in high- and low-

trait-anger community adults. Journal of Clinical Psychology, 58(12), 1573–1590.

https://doi.org/10.1002/jclp.10076

Takeuchi, R., Chen, Z., & Cheung, S. Y. (2012). Applying uncertainty management

theory to employee voice behavior: An integrative investigation. Personnel

Psychology, 65(2), 283–323. https://doi.org/10.1111/j.1744-6570.2012.01247.x

Tellegen, A. (1985). Structure of mood and personality and their relevance to assessing

anxiety, with an emphasis on self-report. In A. H. Tuma & J. D. Maser (Eds.),

Anxiety and the anxiety disorders (pp. 681–706). Hillsdale, NJ: Erlbaum.

Tepper, B. J. (2000). Consequences of Abusive Supervision. Academy of Management

Journal, 43(2), 178–190. https://doi.org/10.5465/1556375

Tepper, B. J., Duffy, M. K., & Shaw, J. D. (2001). Personality moderators of the

relationship between abusive supervision and subordinates’ resistance. Journal of

Applied Psychology, 86(5), 974–983. https://doi.org/10.1037/0021-9010.86.5.974

Tesser, A., & Collins, J. E. (1988). Emotion in Social Reflection and Comparison

Situations: Intuitive, Systematic, and Exploratory Approaches. Journal of

Personality and Social Psychology, 55(5), 695–709. https://doi.org/10.1037/0022-

3514.55.5.695

135

Tracy, S. J., Lutgen-Sandvik, P., & Alberts, J. K. (2006). Nightmares, Demons, and

Slaves. Management Communication Quarterly, 20(2), 148–185.

https://doi.org/10.1177/0893318906291980

Tripp, T. M., & Bies, R. J. (1997). What’s good about revenge? The avenger’s

perspective. Research in Negotiation in Organizations, 6, 145–160.

Tripp, T. M., Bies, R. J., & Aquino, K. (2002). Poetic justice or petty jealousy? The

aesthetics of revenge. Organizational Behavior and Human Decision Processes,

89(1), 966–984. https://doi.org/10.1016/S0749-5978(02)00038-9

Van Kleef, G. A., & Côté, S. (2007). Expressing Anger in Conflict: When It Helps and

When It Hurts. Journal of Applied Psychology, 92(6), 1557–1569.

https://doi.org/10.1037/0021-9010.92.6.1557

Van Kleef, G. A., De Dreu, C. K. W., & Manstead, A. S. R. (2004). The Interpersonal

Effects of Anger and Happiness in Negotiations. Journal of Personality and Social

Psychology, 86(1), 57–76. https://doi.org/10.1037/0022-3514.86.1.57

Vartia, M. (1996). The sources of bully - Psychological work environement and

organizational climate. European Journal of Work and Organizational Psychology,

5, 203–214.

Weiss, H. M., & Beal, D. J. (2005). Reflections on Affective Events Theory. In N.

Ashkanasy, W. Zerbe, & C. Hartel (Eds.), The Effecct of Affect in Organizational

Settings (Research on Emotions in Organizations, Vol. 1) (pp. 1–21). Emerald

Group Publishing Limited. https://doi.org/10.1016/S1746-9791(05)01101-6

136

Weiss, H. M., & Cropanzano, R. S. (1996). Affective events theory: A theoretical

discussion of the structure, causes and consequences of affective experiences at

work. In L. L. Cummings (Ed.), Research in Organizational Behavior (pp. 1–74).

Greenwich, CT: JAI Press.

Wert, S. R., & Salovey, P. (2004). A social comparison account of gossip. Review of

General Psychology, 8(2), 122–137. https://doi.org/10.1037/1089-2680.8.2.122

Wheeler, A. R., Halbesleben, J. R. B., & Whitman, M. V. (2013). The interactive effects

of abusive supervision and entitlement on emotional exhaustion and co-worker

abuse. Journal of Occupational and Organizational Psychology, 86(4), 477–496.

https://doi.org/10.1111/joop.12034

White, F. A., Charles, M. A., & Nelson, J. K. (2008). The Role of Persuasive Arguments

in Changing Affirmative Action Attitudes and Expressed Behavior in Higher

Education. Journal of Applied Psychology, 93(6), 1271–1286.

https://doi.org/10.1037/a0012553

Wihler, A., Blickle, G., Ellen, B. P., Hochwarter, W. A., & Ferris, G. R. (2017). Personal

Initiative and Job Performance Evaluations: Role of Political Skill in Opportunity

Recognition and Capitalization. Journal of Management, 43(5), 1388–1420.

https://doi.org/10.1177/0149206314552451

Williams, K. J., Suls, J., Alliger, G. M., Learner, S. M., & Wan, C. K. (1991). Multiple

role juggling and daily mood states in working mothers: An experience sampling

study. Journal of Applied Psychology, 76(5), 664–674. https://doi.org/10.1037/0021-

9010.76.5.664

137

Wojciszke, B., Abele, A. E., & Baryla, W. (2009). Two dimensions of interpersonal

attitudes: Liking depends on communion, respect depends on agency. European

Journal of Social Psychology, 39(6), 973–990. https://doi.org/10.1002/ejsp.595

Wolfe, D. M. (1988). Is there integrity in the bottom line: Managing obstacles to

executive integrity. In S. Srivastava (Ed.), The search for high human values in

organizational life (pp. 140–171). San Francisco, CA: Jossey-Bass.

Wong, S. S., & Boh, W. (2010). Leveraging the ties of others to build a reputation for

trustworthiness among peers. Academy of Management Journal, 53(1), 129–148.

https://doi.org/10.5465/amj.2010.48037265

Yoo, J. (2013). The influence of social undermining on the service employee’s customer-

oriented boundary-spanning behavior. Journal of Services Marketing, 27(7), 539–

550. https://doi.org/10.1108/JSM-03-2012-0060

Yu, L., Duffy, M. K., & Tepper, B. J. (2018). Consequences of downward envy: A model

of self-esteem threat, abusive supervision, and supervisory leader self-improvement.

Academy of Management Journal, 61(6), 2296–2318.

https://doi.org/10.5465/amj.2015.0183

Zapf, D. (1999). Organisational, work group related and personal causes of

mobbing/bullying at work. International Journal of Manpower, 20(1–2), 70–85.

https://doi.org/10.1108/01437729910268669

Zapf, D., & Gross, C. (2001). Conflict escalation and coping with workplace bullying: A

replication and extension. European Journal of Work and Organizational

Psychology, 10(4), 497–522. https://doi.org/10.1080/13594320143000834

138

Zapf, D., Knorz, C., & Kulla, M. (1996). On the relationship between mobbing factors,

and job content, social work environment, and health outcomes. European Journal

of Work and Organizational Psychology, 5(2), 215–237.

https://doi.org/10.1080/13594329608414856

139