The Power Factor in Adaptive Leadership and Power

By Walter E. Natemeyer and Carl W. Hunt

This series on Adaptive Leadership and Power for Secure Cyberspace Operations began with a look at the requirement to adapt sound leadership principles for operations in cyberspace today. We proposed that we could integrate several traditional and non-traditional techniques that lend themselves well to leadership in the connected age.

We pointed to Dwight Eisenhower’s tried and true leadership perspectives, Paul Hersey and Ken Blanchard’s Situational Leadership model and a novel take on leadership that Nick Obolensky calls Complex Adaptive Leadership. We also demonstrated the power that John Boyd’s OODA Loop model offers to help leaders orient to the emergent environmental conditions that cyberspace and its massive connectivity poses to leaders in the connected age.

All of these approaches and models had one thing in common, whether addressing the environments of cyberspace or not: Leadership is the process of influencing others in efforts toward goal accomplishment. The fact is that leaders cannot automatically influence other people. Leaders have to have some sort of power to enable them to gain compliance or commitment from others.

We define Power as the potential for influence. Leaders who understand how to use power are clearly more effective than those who do not. This was true before the advent of cyberspace but in the face of a relentless, adaptive threat to our organizational networks today, the effective use of power to coordinate and influence our people in the exercise of secure cyberspace operations is more critical than ever.

Let’s look at some ways power has been classified in management literature. Amitai Etzioni broke power into two major categories. [1] One is called position power, and those are the powers that are bestowed upon a leader as a result of title, role or position within the organization. The other is called personal power. It is the power that leaders earn interacting with others based on their respect for knowledge, judgment, experience and the way that they treat other people. It is important for leaders to develop and utilize both their position power and their personal power.

Position Power and Personal Power consist of seven power bases. [2] There is an additional, perhaps transcendent, power base, truly prevalent in the age of cyberspace, which we loosely call “Network Power;” We will discuss this at the end of our description of the initial seven power bases. Figure 1 depicts all of these power bases in relation to each other and to the readiness level of the follower.

Expert Power is based on the perception that the leader has relevant education, experience and expertise to influence the follower’s behavior. It is based on respect for the expertise of the leader.

The second power base is called Information Power. It is based on the perception that this leader has access to, or perhaps control over, information that is useful to followers. People who excel at accessing and providing information are in a better position to influence followers than people who are not.

The third power base is called Referent Power. Referent Power is based on the degree to which the followers like, respect and admire their leader.

The fourth power base is Legitimate Power. This is based on the perception that this individual, because of his or her position, has the right to tell a follower what to do, and the follower has a responsibility to comply.

The fifth power base is called Reward Power. Reward Power is based on the perception that if the follower does what this leader wants, he/she is going to get some positive rewards for that compliance.

Sixth is Connection Power. Connection Power is based on the perception that this individual is connected to important or influential people within or even outside this organization. If the follower does what the leader wants because he/she hopes that it will gain the favor or perhaps avoid the disfavor of those “connections,” they are being influenced by the leader’s Connection Power. [3]

The seventh power base is Coercive Power. Coercive Power is built upon fear. It is based on the perception that if the follower doesn’t do what the leader wants, there will be negative consequences.

Finally, there is also what we are labeling Network Power that has become more noticeable since the advent of cyberspace and the massive connectivity that emerges from this relatively new environment. Over the last few years, several prominent thinkers have written about the general nature of Network Power from a variety of standpoints, including social networks, economies and governance. [4] We speak specifically of the influence of networks on leadership and management in this blog post series, however.

Joshua Cooper Ramo notes that the “future will almost certainly bring a study of the influence of network power upon history” and we take from his thoughts that leaders must also recognize the influence of network power in leadership. [5] “In connected systems, power is defined by both profound concentration and by massive distribution,” Ramo writes. “It can’t be understood in simple either-or terms. Power and influence will, in the near future, become even more centralized than in feudal times and more distributed than it was in the most vibrant democracies.” [6]

In the context of the Adaptive Leadership and Power for Secure Cyberspace Operations model, this means that Network Power propagates across cyberspace such that all the power bases might have some level of influence in any situation (e.g., not “either-or” as Ramo notes). “What is true for the machines all around us now is true for us too: We are what we are connected to.” [7] Network Power can and likely will enhance or dampen the “traditional” seven forms of power we described above, sometimes in alternating fashion.

“Network power, we might say, exists as a skin of billions of tied-together points linked to vital, centralized cores…Networks create concentration and distribution. As a result, they rip apart many existing structures.” [8] Thus, according to Ramo, Network Power as we describe it for ALP-SCO, is both an ingredient of the former power bases, and a “connector” for adaptive leadership functions. This is distinct from the Connection Power base previously mentioned, but a more general use of the term.

Ramo’s definitions of Network Power also means that all of the power bases that are infused through our take on Network Power change the character of the relationships between leaders, followers, and the organization, however subtly.

The impact of the four environments of cyberspace also come into play. “If connection changes the nature of an object, it also elevates those who control that connection to a level of rare power and influence.” [9] In ALP-SCO, leaders must bear this in mind. While there is much to learn about Network Power, this is an area worth hypothesizing about and studying. [10]

Figure 1 is an initial effort to integrate Walt Natemeyer’s previous work adapting power bases to follower readiness (and, by extension, leadership styles) to the realities that Network Power expresses in the connected age. Network Power must be recognized, facilitated and accommodated.

 

Leader Power Bases

Figure 1: Leadership Power Bases

 

In the absence of further study of Network Power in relationship to ALP-SCO, we note that when attempting to gain compliance from people with below average readiness (R1/R2), leaders should ideally possess and use their position powers, while tapping the networks they’ve built to focus these position powers. The leader’s ability to provide positive or negative consequences directly (reward and coercive power) or indirectly (connection power) can be instrumental in getting followers at R1 and R2 to accomplish organizational objectives they otherwise would not do.

With people of average readiness (R2/R3), a combination of both position and personal powers tends to be effective at influencing them. Providing positive consequences (reward power), asserting authority (legitimate power) and leveraging positive relationships with people (referent power) tends to work well at gaining their compliance.

And with people of above average readiness (R3/R4), utilizing personal powers (referent, information and expert power), particularly enhanced through social networks, is potentially most effective.

Network Power serves to enhance and/or dampen these powers just as networks do in all other fields (economics, governance, etc.). The leader that learns and exploits Network Power can excel at exercising the other seven powers.

Just as researchers found that there is no one best leadership style, they likewise concluded that there is no one best power base for a leader to use. This is particularly true in the connected age where not only the follower’s readiness is an important measure but so is the impact of the environmental conditions cyberspace imposes. There is no one best leadership technique and there is no one best power base to call upon to influence followers…cyberspace and the networks that emerge makes this certain.

The key to success in exercising power for secure cyberspace operations is to build all the power bases and use them according to the follower’s readiness level and the environmental factors that cyberspace presents. Understanding and leveraging Network Power is critical to that success.

Next time, we’ll provide a few vignettes that illustrate the convergence of follower readiness, cyberspace environmental conditions, leadership styles and how Network Power affects us all.

Originally posted 8/29/2016.

[1] Etzioni, A., A Comparative Analysis of Complex Organizations, The Free Press, NY, 1975, p. 159.

[2] For a detailed review of the Seven Power Bases in organizational behavior, see Natemeyer, W., and Hersey, P., “Situational Leadership and Power,” Classics of Organizational Behavior, Waveland Press, IL, 2011, p. 440.

[3] This “Connection” power base was identified long before the advent of cyberspace and network connectivity. In spite of the apparent overlap of meaning, we will continue to use the original definition of this term as it relates to the power base theory. We’ll try to be clear where confusion may arise.

[4] Important texts in this area of study include the following: Watts, D., Six Degrees: the Science of a Connected Age, Norton, 2003; Grewal, D. S., Network Power: The Social Dynamics of Globalization, Yale University Press, 2008; The books of Alvin and Heide Toffler (e.g., Future Shock, The Third Wave, etc.); and a very recent work, Ramo, J, The Seventh Sense: Power, Fortune, and Survival in the Age of Networks, Little, Brown and Company, NY, 2016.

[5] Ramo, op. cit., p. 85.

[6] Ibid., p. 116.

[7] Ibid., p. 35

[8] Ibid., pp, 116-118.

[9] Ibid., p. 177. Throughout the remainder of his book, Ramo describes what he calls “gateways” and “gatekeepers” as being the ultimate holders of power and influence in the connected age.

[10] In fact, one of the expected outcomes of this blog post series is the working proposal to study the role of leadership power in cyberspace and networks. One of the things we propose to look at in this research is the emergence and role of gatekeepers and gateways that exist in cyberspace, as noted by Ramo.

Leadership Orientation in Cyberspace

by Carl W. Hunt, Walter E. Natemeyer and Chuck E. Hunt

Part II of The Future of Leadership in Cyberspace Series[1]

Dwight Eisenhower said “Now I think, speaking roughly, by leadership we mean the art of getting someone else to do something that you want done because he wants to do it, not because your position of power can compel him to do it, or your position of authority.”[2]

This definition of leadership, often quoted in books, papers and training classes, evokes the essence of the subject of leadership in any environment: inspiration, motivation, preparation, power and authority. It focuses on both leaders and followers, two of the three most critical elements of adaptive leadership and power for secure cyberspace operations (ALP-SCO) in the connected age.

As we presented in the first post in this series, the environment of cyberspace itself is the third element that drives the function and role of leadership today. When we start thinking about leadership in these three terms, it becomes ever clearer that the hierarchical models of leadership are shattered. If effective leadership wasn’t hard enough before cyberspace, the new environment of cyberspace should definitely get a leader’s attention.

Respected network enterprise services and equipment provider Cisco Systems, just released their “Midyear Cybersecurity Report.”  Their Executive Summary concludes: “Attackers currently enjoy unconstrained time to operate. Their campaigns, which often take advantage of known vulnerabilities that organizations and end users could have—and should have—known about and addressed, can remain active and undetected for days, months, or even longer.”

This could be construed as a virtual indictment of leaders in all types of modern organizations, whether commercial, government or academic. If it’s not leaders who allow attackers to dwell in organizational IT systems for “days, months, or even longer” who is it? That’s rhetorical, of course…it’s the leaders. But as we noted last time in Part I of this series, it’s a tremendous challenge for leaders and followers to understand and orient to what’s really happening in their little corner of cyberspace.

There is a broad spectrum of difficulty in orienting to challenges that leaders face within highly interconnected, cyberspace-based organizational settings. Nick Obolensky suggests that there are four basic operating environments or domains.[3] He bases his four-part framework on the work of David Snowden and Mary Boone in their Cynefin Model.[4] This model introduced the four domains in which leaders typically operate and make decisions, in any organizational setting.[5]

In graphical terms, we might visualize these operating domains as shown in Figure 1. These domains are not necessarily linearly connected, but rather interconnected with relationships and information passing between each, through channels that often emerge unpredictably, as Snowden and Boone wrote. Operating in cyberspace further obscures these flows.[6]

LOD Quad Chart

Figure 1: Leadership Orientation Domains (LODs)

Last time, we introduced these four environments for leadership in cyberspace as Leadership Orientation Domains (LOD). Simple environments are where “cause and effect are fully linked and known, and so predictability is high. If you do ‘This’ you get ‘That’. It is the area of process and best practice.”[7] This is the domain of “what you see is what you get,” so says the old saying. As the picture shows, it’s essentially a flat landscape that doesn’t hide or obscure information flows.

Next on the scale, or grid if you prefer, are Complicated environments, where “cause and effect are there, but the linkages are not so obvious and need analysis to sort it out. Predictability is less than ‘The Simple,’ but with careful analysis and consideration the choices one makes have a fair degree of predictable outcome.”[8] Figure 1 might indicate that this is a “hillier landscape” and thus not all the connections are necessarily easy to see from every point in the organization, but obscurity of connections is still low. It’s possible to still get an overall viewpoint of what’s going on, even if we have to look harder.

A Simple LOD empowers leaders to act with straightforward, cause-and-effect models and methods that are generally predictable and leverage experience and intuition nicely. A Complicated LOD requires a bit more analysis and occasional “outside-the-box” thinking. Both simple and complicated fall within the realm of “best practices” and familiar models and tools.

Experts thrive in these two environments and are often the key players in decision-making and risk management. Also, Simple and Complicated LODs have generally simple patterns that are ultimately straightforward to detect and where risk is apparent to the trained and observant leader, and quite often to experienced followers, as well. When management advises “you just need to follow the rules” or the standard operating procedures or “the book,” they are really referring to Simple and Complicated operating domains.

After simple and complicated, however, leaders must “jump” an intellectual chasm that leads to the “mysteries” of complexity and chaos in organizations. In the next two operating domains, leaders have to be willing to balance intuition and experience with imagination and discovery. If leaders are successful in thinking beyond the boundaries of cause and effect, they will be better prepared to see and interact with the new organizational world that has emerged with the advent of cyberspace.

The “rules” and the “book” may offer a basic foundation for thinking through the challenges of these environments, but it’s up to leaders to sense the conditions of the challenges and opportunities of cyberspace, orient to the leadership behaviors required and to adjust and adapt accordingly. As the bottom two areas in figure 1 suggest, there are interacting weaves that are very difficult to follow, but the patterns can be detected through a creative mind and appreciation for emergence.

The Complex environment is where “‘cause and effect’ are combined. The multiple ‘agents’ involved (for example, people, organizations, technological component parts of the system and so on) are interconnected with feedback loops that affect each other in a complex network that is hard to predict.”[9] In reality, the patterns are in fact present but require maximum creativity to orient to the patterns; this domain may even require advanced models and simulations to visualize and interact with existing and generated data to observe these patterns.[10]

Resolving complexity in an operational domain requires an understanding of emergence, a term on which we can expand a bit here. Being comfortable with the concept of emergence in an organization entails an appreciation that sometimes things happen or people behave in what appears to be totally unpredictable ways. This is sometimes referred to as an object being more than the sum of its parts, and where even a full comprehension of those component parts does not lead to an understanding of their interactions and ultimate behaviors. For example, individual follower behaviors in a group do not always apprise leaders as to what will happen when these interactions and resulting team behaviors occur. This keeps adaptive leadership interesting and absolutely necessary![11]

It’s even more difficult to visualize and orient leadership experiences in the Chaotic environment. This is “rare and is where there is no discernible cause and effect at all.” Obolensky, Snowden and Boone essentially say that there are “no manageable patterns – only turbulence.”[12] Here the leader’s main job is not to find patterns, but “stop the bleeding” and allow the team or organization to get back into the game as soon as possible and move towards a domain in which the organization can get things under some semblance of control. In scientific terms, chaos is a well-studied state and it is currently unclear that organizational operations in the chaotic environment are even possible for very long.

Organizations can thrive in simple and complicated environments and if they can master complex environments, they may even succeed beyond all expectations. Chaos, however, may not only be debilitating but destructive, and should be avoided or at least mitigated, if at all possible.[13]

So, a Complex LOD requires leaders to test the environment and think beyond intuition and experience; they must be prepared to adapt to a world that often surprises them, and while there are models and tools available, they require practice and objectivity to leverage them. If they were describing leadership in cyberspace in their original work, Snowden and Obolensky might say that a Chaotic LOD is in some sense the easiest of the four since there is no discernible pattern to guide decision-making and action; the leader just needs to do something to get the organization out of this domain as soon as possible. Quite often, one action is as good any other, but constant planning and training will help prepare for eventual action![14]

A key problem for leaders is how to learn which of the LODs they are facing (if they are fortunate to be facing only one at a time) and what they can do about it. Each of these four environments requires different orientations, behaviors and activities for leaders to be successful within their organizations and cope with demands each environment makes on an organization.

Mismatch of leadership decisions and actions to domain requirements can be as bad as mismatching leadership styles to follower readiness levels, as will we note in the near future. This is where the tried but true Observe-Orient-Decide-Act (OODA) model we introduced last time can help leaders operating in cyberspace achieve orientation for all leadership functions.

OODA for orientation to LODs to more effectively lead secure cyberspace operations is the subject of our post next time.

Originally posted: 8-9-2016.

Notes:

[1] This series is part of an ongoing effort to better understand the challenges of providing Adaptive Leadership for Secure Cyberspace Operations for the United States and our international partners.

[2] Dwight D. Eisenhower in his remarks at the Annual Conference of the Society for Personnel Administration, 5/12/54, from the archive recorded at the Presidential Library of the former president.

[3] Obolensky, N., Complex Adaptive Leadership: Embracing Paradox and Uncertainty, Ashgate Publishing Ltd., Kindle Edition, 2014, p. 55.

[4] Snowden, D. and Boone, M., “A leader’s framework for decision makingHarvard Business Review, November, 2007.

[5] The domains Snowden and Boone discuss are not original to them, but have been categories discussed for years as a part of the study of what is known as complexity science. See for example, Kauffman, S.A., The Origins of Order, Oxford Press, NY, 1993.

[6] For more detailed images of the four domains as presented by Snowden, see Snowden, D. and Boone, M., op. cit.

[7] Obolensky, op. cit. p. 55.

[8] Ibid.

[9] Ibid.

[10] Agent-based models and simulations are examples of the advanced computational tools that may be required to visualize patterns in complex domains.

[11] Snowden and Boone’s paper recounts a NASA example: “There is a scene in the film Apollo 13 when the astronauts encounter a crisis (‘Houston, we have a problem’) that moves the situation into a complex domain. A group of experts is put in a room with a mishmash of materials—bits of plastic and odds and ends that mirror the resources available to the astronauts in flight. Leaders tell the team: This is what you have; find a solution or the astronauts will die. None of those experts knew a priori what would work. Instead, they had to let a solution emerge from the materials at hand. And they succeeded. (Conditions of scarcity often produce more creative results than conditions of abundance.)” Snowden and Boone, 2007, op. cit.

[12] Obolensky, op. cit.

[13] In many circumstances, the best we can seek is to create an environment that fosters a “positive emergence” or outcome, referring back to the previous discussion on emergence. Both complexity and chaos can produce emergences, but as leaders, we would like to understand them as they occur, and guide the environmental factors that might improve the likelihood for a good outcome.

[14] Ibid. These descriptions of the four environments are based on Obolensky’s recitation of David Snowden’s Cynefin Model, Obolensky page 55-56. Snowden also calls the “Simple” environment the “Obvious” and includes a fifth domain called “Disorder”. In this paper, we use the four domain descriptions as provided by Obolensky.