Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Collaboration Tools Can Help Build a Friendlier Workspace

Collaboration Tools Can Help Build a Friendlier Workspace

There’s a misconception in the business world that being too nice will make you appear as a pushover, but as far as cliches go, “Nice guys finish last” doesn’t have much supporting evidence in favor of it.

You Don’t Have to Be a Jerk to Make Progress

Even if the stereotype of the office jerk is all over the place, research shows that being unpleasant in the workplace doesn’t really get you anywhere. If anything, it is actually detrimental to your professional development.

Introducing Cameron Anderson, Professor of Organizational Behavior at UC Berkeley

Following the 2016 election, Anderson sought to study the impact that being unpleasant can have on outcomes. To gauge these results, Anderson chose to examine the correlation between a personality test administered decades ago with where the participants were professionally in the present day.

The end result makes for a great title:  People with disagreeable personalities (selfish, combative, and manipulative) do not have an advantage in pursuing power at work. His research shows that people who are unpleasant in their day-to-day duties are no more likely to make upward progress than those who aren’t, no matter how toxic the workplace is.

The study also showed, however, that pleasantness and generosity were not a factor, either. The research shows that either individual, pleasant or unpleasant, is no more likely to succeed in an isolated environment, but when they are allowed to meld together (as they do in a realistic workplace), they tend to cancel each other out. Another study from the University of Hong Kong, the University of Iowa, and Purdue University showcases an interesting correlation based on the results of a metastudy of 200 other pieces of research. They found that people who are supportive and proactive, not just agreeable, are more likely to reach the top compared to those who aren’t.

Changing the Office Dynamic Takes Effort

Being a jerk isn’t necessarily the determining factor in someone’s success, but it’s also not going to help anyone around you, either. If anything, you should want to remedy this behavior so you can help others around you achieve their best results, too.

Some academics, like Bob Sutton, a professor of management science at Stanford, believe that a zero-tolerance approach toward unpleasant behavior can get the job done. The idea behind this policy is that when someone starts throwing their weight around, you throw it right back at them. Businesses can also make more efforts to reward not just those who are productive from a personal standpoint, but also uplift and encourage their coworkers to be their best selves.

With things like the Great Resignation, quiet quitting, and rage applying all over the place, you really don’t need to give your employees more reasons to seek employment elsewhere. After all, it costs more to replace an employee than to hold on to a good one. If you can foster an encouraging and collaborative environment, you might be surprised by how much you find your workplace can change in a short period of time. It might even help you draw in and retain top talent.

One of the big ways you can make sure your team feels seen, appreciated, and understood is by respecting them enough to give them the tools they need to do their jobs effectively. Voyage Technology can help to make this happen for your business. To learn more about our technology services, be sure to give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Saving Money Cybersecurity Communication Data Backup Smartphone Managed Service Android Upgrade Business Management VoIP Smartphones Productivity Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Information Covid-19 Miscellaneous Holiday Gadgets Server Managed Service Provider Remote Work Training Outsourced IT Compliance Employee/Employer Relationship Encryption Spam Office IT Support Windows 10 Data Management Government Business Continuity Windows 10 Blockchain Bandwidth Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail Budget BYOD Apple App Employer-Employee Relationship Tip of the week Conferencing Information Technology Avoiding Downtime Marketing Office 365 How To BDR HIPAA WiFi Applications Access Control Computing Hacker Retail Risk Management Healthcare Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health 2FA Help Desk Operating System Computers Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Solutions Physical Security Social Display Printer Paperless Office Going Green Windows 11 Infrastructure Monitoring Customer Service Excel Cybercrime Document Management Cryptocurrency Managed IT Service Wireless Technology Maintenance Antivirus Downloads iPhone Virtual Desktop Data storage Licensing LiFi Vulnerabilities Word Entertainment Outlook Data Privacy Images 101 Money Humor Telephone System Multi-Factor Authentication Robot Mobility Cost Management Safety Sports Mouse IT Management VPN Employees Meetings Integration Administration User Tip Modem Computer Repair Mobile Security Processor Holidays Customer Relationship Management Data Storage Settings Wireless Printing Smart Technology Supply Chain Content Filtering Video Conferencing Machine Learning Managed Services Provider Hacking YouTube Saving Time Virtual Machines Presentation Professional Services Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT 5G Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality IP Address Google Docs Twitter Alerts SQL Server Technology Care Unified Communications Experience Financial Data Error History Bitcoin Business Communications Running Cable Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Google Wallet Upload Procurement Remote Computing Azure Hybrid Work Recovery Social Network Telework Cyber security Hard Drives Windows 8 Multi-Factor Security Tech Human Resources Laptop Dark Web Cables CES Tablet IoT Communitications Domains Drones Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech File Sharing Regulations Refrigeration Dark Data Google Calendar Term Google Apps Halloween How To Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Public Speaking Gamification Flexibility Lithium-ion battery Notifications Staff Value Business Intelligence Organization Travel Social Networking Hacks Legislation Shortcuts Entrepreneur Scary Stories Ransmoware Fun Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Deep Learning Health IT Unified Threat Management Motherboard Data Breach Undo Comparison Google Play Be Proactive Permissions Workforce Education Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Threats Trend Micro Mobile Computing Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta Search User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Application Best Practice Buisness Point of Sale eCommerce Black Friday SSID IBM Legal Virtual Assistant Outsource IT IT solutions Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Business Growth Media Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Cortana Tactics Development Websites Mirgation Hypervisor Displays Alt Codes Downtime Shopping Nanotechnology Optimization Competition PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hosted Solution SharePoint Addiction Management PCI DSS Chatbots Typing Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Google Drive Virtual Reality Computing Infrastructure Teamwork Hiring/Firing User Knowledge

Blog Archive