4.3 Typology of Unethical Communication – Organizational Communication Anthology (2024)

Chapter 4: Ethical Communication in Organizations

[author removed at request of original publisher]

Page Attributions

Redding’s Typology of Unethical Organizational Communication

As part of Redding’s (1996)call for the field of organizational communication to “wake up” and start studying ethics, he created a basic typology of unethical organizational communication. The resulting typology of unethical organizational communication consisted of six general categories: coercive, destructive, deceptive, intrusive, secretive, and manipulative-exploitative.

  1. CoerciveCommunication: The first category of unethical organizational communication discussed by Redding (1996) is coercive acts. He definedcoerciveacts as:

communication events or behavior reflecting abuses of power or authority resulting in (or designed to effect) unjustified invasions of autonomy. This includes: intolerance of dissent, restrictions of freedom of speech; refusal to listen; resorting to formal rules and regulations to stifle discussion or to squash complaints, and so on. (pp. 27–28)

  1. Destructive Communication:The second category of unethical organizational communication discussed by Redding (1996) isdestructiveacts. He defined destructive acts as:

communication events or behavior attack receivers’ self-esteem, reputation, or deeply held feelings; reflecting indifference toward, or content for, basic values of others. This includes: insults, derogatory innuendoes, epithets, jokes (especially those based on gender, race, sex, religion, or ethnicity); put-downs; back-stabbing; character-assassination; and so on. It also includes the use of “truth” as a weapon (as in revealing confidential information to unauthorized persons, or in using alleged “openness” as a façade to conceal the launching of personal attacks. (pp. 28–29)

When looking at Redding’s explanation of destructive communicative acts, there are clearly two parts: aggressive communication and use of information. The first part of his definition focuses on how individuals can use aggressive forms of communication in an attempt to make others feel inferior. These types of communicative acts are commonly referred to as verbally aggressive acts. The second aspect of destructive communication is about how people use information within an organization. Information is commonly seen as a commodity in many organizations, so the hoarding of information as well as using information in manipulative manners is quite common.

  1. Deceptive Communication:The third category of unethical organizational communication discussed by Redding (1996) isdeceptiveacts. He defined deceptive acts as:

communication events or behavior reflecting a “willful perversion of the truth in order to deceive, cheat, or defraud” (Webster’s Ninth New Collegiate Dictionary, 1998, s.v. “dishonesty”). This includes: evasive or deliberately misleading messages, which in turn includes equivocation (i.e., the deliberate use of ambiguity) …; also bureaucratic-style euphemisms designed to cover up defects, to conceal embarrassing deeds, or to “prettify” unpleasant facts. (p. 30).

In this category of unethical behavior, we have non-truthful and misleading messages. The first part of this definition examines how some individuals lie in order to get what they want at work. The second part of the definition examines how some individuals or organizations use messages in order to alter a receiver’s perception of reality. The messages, in this case, are not explicitly not-true, but are manipulated in a fashion to alter how receivers interpret those messages.

  1. Intrusive Communication:The fourth category of unethical organizational communication discussed by Redding (1996) isintrusiveacts. He defined intrusive acts as:

communication behavior that is characteristically initiated by message receivers. For example,…the use of hidden cameras, the tapping of telephones, and the application of computer technologies to the monitoring of employee behavior; in other words, surveillance. The fundamental issue, of course, revolves around the meaning and legitimacy of “privacy rights.” (p. 31)

The issue of intrusion has become important in the 21st Century because modern technology has made intrusion into individuals’ private lives very easy. Whether potential employers are looking at your private Facebook information prior to interviewing you or employers install software on your computer that monitors every key stroke you make, corporate “big-brother” is definitely watching you. According to a 2005 survey conducted by the American Management Association, 36% of respondents had some amount of monitoring of their computer key-strokes by their organizations and 50% of respondents had some or all of their computer files monitored by their organizations. 76% of respondents noted that their workplace monitored their internet activity. In fact, 26% of the respondents indicated that their organizations had fired workers for misusing the internet and another 25% had terminated employees for e-mail misuse. Corporate intrusion does not stop with computer activity. 3% of the respondents said that all of the employees in their organization have their telephone calls recorded while 19% said that only selected job categories had their telephone calls recorded. Some companies go so far as to track their employee’s physical whereabouts via global positioning systems and satellite technology in company vehicles (8%), company cell phones (5%), and employee identification cards (8%). We should mention that there are court cases within the United States that have legalized all of these processes without requiring a forewarning to employees. In the European Union, however, employees must be notified prior to monitoring, but organizations can still legally monitor their employees.

Organizations can also spy on one another. Professional sports teams have been accused of illegally filming opponents and relaying plays obtained without permission, in an attempt to advance their team.

  1. Secretive Communication:The fifth category of unethical organizational communication discussed by Redding (1996) issecretiveacts. He defined secretive acts as:

various forms of nonverbal communication, especially (of course) silence and including unresponsiveness. It includes such behaviors as hoarding information (I call this “culpable silence”) and sweeping under the rug information that, if revealed, would expose wrongdoing or ineptness on the part of individuals in positions of power. (p. 32)

According to Redding, even nonverbal unresponsiveness can be a form of unethical communication. For example, if the sender of the message purposefully manipulates her or his nonverbal behavior in an attempt to skew how a receiver interprets a message, then the sender of the message is preventing the receiver from completely and accurately interpreting the message. Furthermore, Redding believes that many employees engage in culpable silence, which occurs when someone purposefully prevents information from being given to receivers who need the information. While culpable silence is not lying in the strictest of senses, culpable silence is clearly a version of deception.

  1. ManipulativeExploitative:The final category of unethical organizational communication discussed by Redding (1996) ismanipulative-exploitativeacts. He defined manipulative-exploitative acts as those where the source purposefully prevents the receiver from knowing the source’s actual intentions behind a communicative message. A term that Redding finds closely related to these unethical acts isdemagoguery:

Of central importance is the notion that a demagogue is one who, without concern for the best interests of the audience, seeks to gain compliance by exploiting people’s fears, prejudices, or areas of ignorance. Closely related to, if not a variant of, demagoguery is the utterance of messages that reflect a patronizing or condescending attitude toward the audience—an unstated assumption that audience members are dull-witted, or immature, or both. (pp. 33–34)

Page Attribution

4.3 Typology of Unethical Communication – Organizational Communication Anthology (2024)
Top Articles
KAWPOW mining profitability | minerstat
RVN Mining : How To Mine Ravecoin (RVN)?
St Thomas Usvi Craigslist
Compare Foods Wilson Nc
Uti Hvacr
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Brgeneral Patient Portal
Us 25 Yard Sale Map
Does Pappadeaux Pay Weekly
Umn Biology
Mercy MyPay (Online Pay Stubs) / mercy-mypay-online-pay-stubs.pdf / PDF4PRO
Craigslist Chautauqua Ny
Winterset Rants And Raves
4156303136
My.tcctrack
Mail.zsthost Change Password
Sonic Fan Games Hq
Pay Boot Barn Credit Card
Van Buren County Arrests.org
Diakimeko Leaks
Qual o significado log out?
Maxpreps Field Hockey
Www.dunkinbaskinrunsonyou.con
Yosemite Sam Hood Ornament
Обзор Joxi: Что это такое? Отзывы, аналоги, сайт и инструкции | APS
Catchvideo Chrome Extension
Carroway Funeral Home Obituaries Lufkin
Danielle Ranslow Obituary
The Collective - Upscale Downtown Milwaukee Hair Salon
Mjc Financial Aid Phone Number
Wbap Iheart
Mini-Mental State Examination (MMSE) – Strokengine
Play It Again Sports Forsyth Photos
Current Students - Pace University Online
Robert A McDougal: XPP Tutorial
Que Si Que Si Que No Que No Lyrics
T&J Agnes Theaters
Snohomish Hairmasters
Gt500 Forums
manhattan cars & trucks - by owner - craigslist
Shipping Container Storage Containers 40'HCs - general for sale - by dealer - craigslist
Citymd West 146Th Urgent Care - Nyc Photos
Haunted Mansion (2023) | Rotten Tomatoes
Best Haircut Shop Near Me
Fluffy Jacket Walmart
Whitney Wisconsin 2022
Pas Bcbs Prefix
Walmart Front Door Wreaths
Fredatmcd.read.inkling.com
Ark Silica Pearls Gfi
Duffield Regional Jail Mugshots 2023
Latest Posts
Article information

Author: Carmelo Roob

Last Updated:

Views: 6077

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.