Chinese strategies applied to negotiation



Download 57.12 Kb.
Date02.06.2016
Size57.12 Kb.
#78688
THE 36 CHINESE STRATEGIES

APPLIED TO NEGOTIATION

from
John Barkai, Cultural Dimension Interests, the Dance of Negotiation, and

Weather Forecasting: A Perspective on Cross-Cultural Negotiation and



Dispute Resolution, 8 Pepperdine Dispute Resolution Law Journal 403 (2008).
The Thirty-six Chinese Strategies or Stratagems are a collection of tactics that can be applied to very different situations. In China, the tactics are somewhat like proverbs or folklore. They have been described as “gems that speak to the cores of Chinese society.”1 Chinese children learn them2 just like Americans learn nursery rhymes. They are taught in school, found in literature, popular folk opera, and sometimes even in television programs.3 It is said that these strategies have become part of the “collective unconscious” of most Chinese people.4 The strategies are derived from military tactics applied during the Warring States Period (403-221 B.C.) or during the Three Kingdom Period (220-265 B.C.).5 Just about anyone who has “grown up Chinese” (meaning that they have grown up in a Chinese home that respects and teaches Chinese traditions) know these Thirty-six Strategies. The author (or authors) of the strategies are unknown.
Although somewhat known in the Western world for many years,6 the Thirty-six Strategies have taken on greater significance as many foreigners have tried to learn more about the Chinese and to do more business with the Chinese. The Thirty-six Strategies have become a part of a number of various ancient military approaches that have been modified and applied to the world of business.7 Although web searches for “36 strategies” will find many web sites about the strategies and numerous links for commercial courses on applying the Thirty-six Strategies to negotiating with the Chinese, there appear to be only a few authors who have written books that focus on the Thirty-six Strategies and negotiations.8
Although the Thirty-Six Strategies are supposedly derived from military strategy, they also seem to reflect the Chinese approach to business, especially business with foreigners. A common Chinese expression is “The marketplace is like a battlefield,” or “The marketplace is a battlefield.”9 For the Chinese, business is like war.10
Perhaps the most important aspect of the Thirty-Six Strategies for non-Chinese to understand is that most of the strategies are based upon deception and deceit. Asia scholar Rosalie Tung describes deception as a normal part of Asian business practices and says that one of twelve principles guiding the East Asian approach to business is “Engaging in deception to gain a strategic advantage.”11 “There can never be too much deception in war,” is another old Chinese saying. And since the marketplace is a battlefield,12 these ideas should leave no doubt about the prominence of deception in Chinese negotiation and business tactics.13
The chart below lists various versions of the Thirty-six Strategies and accompanies each with a contemporary maxim that makes the original strategy a little more clear to present-day negotiators. The contemporary maxims presented below come either from interpretations by my former students, from various web sites, or are my own interpretation. The source of the phrase used for the original strategy is given by the two-letter code that follows the strategy in parentheses. CNC is Chin-Ning Chu; LB is Laurence Brahm; TF is Tony Fang; and RM is Robert March. Unless otherwise indicated, the description of the Original Strategy is by Laurence Brahm.






The Original 36 Strategies


Contemporary Maxims

1

Cross the Sea by Deceiving the Sky.


Act in the open, but hide your true intentions.

2

Besiege Wei to Rescue Zhao.

Attack their Achilles heel.

3

Kill with a Borrowed Knife.

Attack using the strength of another person.

4

Relax and Wait for the Adversary to Tire Himself Out. Await leisurely the exhausted enemy.

Exercise patience and wear them down

5

Loot a Burning House.

Hit them when they are down.

6

Make a Feint to the East While Attacking in the West.

Fake to the right; attack to the left.

7

Create Something Out of Nothing.

Turn something that is not substantial into reality.

8

Secretly Utilize the Chen Cang Passage (CNC). Pretend to Advance Down One Path While Taking Another Hidden Path (LB).

Pretend to care about an issue and later give it up to get what you really want.

9

Watch the Fire Burning from Across the River.

Allow them to fight your other enemy while you rest and observe. Later, defeat the exhausted survivor.

10

Conceal a Dagger in a Smile.

Befriend them to get their guard down, then attack their weakest point.

11

Sacrifice a Plum Tree to Save a Peach Tree (RM). Let the Plum Tree Wither in Place of the Peach Tree (TF).

Trade up! Take a small loss for a large gain.

12

Take Away a Goat in Passing.

Take advantage of every small opportunity.

13

Beat the Grass to Startle the Snake.

Stir things up before beginning to negotiate for your true interests.

14

Raise a Corpse from the Dead (LB). Borrow a Corpse to Return the Soul (TF).

Revive a dead proposal by presenting it again or in a new way.

15

Lure the Tiger out of the Mountain.

Seek a neutral location. Negotiate after leading them away from a position of strength.

16

Let the Adversary off in order to Snare Him. To Capture the Enemy, First Let It Go (RM).

Do not arouse their spirit to fight back.

17

Toss out a Brick to Attract a piece of Jade. Toss out a Brick to Attract Jade (RM).

Trade something of minor value for something of major value.

18


To Catch Bandits, Nab Their Ringleader First. To Catch the Bandits, First Catch Their Ringleader (RM).

Convince the leader and the rest will follow.

19

Remove the Fire from under the Cauldron.

Eliminate the source of their strength.

20


Muddle the water to catch the fish (TF). Gathering Fish from Trouble Waters (LB).

Do something surprising or unexpected to unnerve them, and then take advantage of that situation.

21

The Cicada Sheds Its Shells. The Golden Cicada Sheds Its Shell. The Cicada Sloughs Its Shell (RM).

When you are in trouble, secretly escape.

22

Fasten the Door to Catch a Thief. Lock the Door and Catch the Thief (RM).

Completely destroy them by leaving no way for escape.

23

Befriend a Distant State While Attacking a Neighboring State. Befriend Distant States While Attacking Nearby Ones (RM).

Build strategic alliances with others that will give you the upper hand.

24

Borrow a Safe Passage to Conquer the Kingdom of Guo (LB). Attack Hu by a Borrowed Path (RM).

Temporarily join forces with a friend against a common enemy.

25

Steal the Dragon and Replace with the Phoenix (CNC). Steal the Beams and Pillars and Replace Them with Rotten Timber (LB). Steal the Beams and Change the Pillars.

Sabotage, incapacitate, or destroy them by removing their key support.

26

Point at the Mulberry Tree but Curse the Locust Tree.

Convey your intentions and opinions indirectly.

27

Feign madness, but keep your balance. Pretend to be a Pig in Order to eat the Tiger (CNC). Play Dumb (LB). Feign Ignorance and Hide One’s Intentions (RM).

Play Dumb, then surprise them. Let them underestimate you.

28

Remove the Ladder after your ascent (LB). Lure the enemy onto the roof, then take away the ladder. Cross the River and Destroy the Bridge (CNC).

Lead them into a trap, then cut off their escape.

29

Decorate the Tree with Fake Blossoms. Flowers Bloom in the Tree (RM).

Reframe deceitfully. Expand the pie with objects of little value.

30

Turn Yourself into a Host from Being a Guest. Host and Guest Switch Roles (RM).

Turn your defensive and passive position into an offensive and active one.

31

Use a Beauty to Ensnare a Man. The honey trap. Beauty Trap (RM).

Provide alluring distractions.

32

Open the Gate of an Undefended City. The Empty City Stratagem (RM).

Deliberately displaying your weakness can conceal your vulnerability.

33

Use Adversary’s Spies to Sow Discord in Your Adversary’s Camp. Turn the Enemy’s Agents against Him (RM).

Provide inaccurate information to mislead them, especially through informal channels.

34

Inflict Pain on Oneself in order to Infiltrate Adversary’s Camp and Win the Confidence of the Enemy. Self-Torture (RM).

Appear to take some hits. Feign weakness while arming yourself.

35

Lead Your Adversary to Chain Together Their Warships. Stratagem on Stratagems (RM).

Devise a set of interlocking stratagems to defeat them.

36


Retreat is the Best Option. If All Else Fails, Run Away (RM).

Purse your BATNA.



1 . March & Wu, supra note 177, at 145.

2 . See Chu, supra note 177, at 156.

3 . Brahm, supra note 177, at xii.

4 . Id.

5 . Brahm, supra note 177, at xii.

6 . The Secret Art of War: Thirty-six Strategies was first published in the 1940s. See March & Wu, supra note 177, at 146.

7 . See generally, Wess Roberts, Leadership Secrets of Attila the Hun (1987); Mark McNeilly, Sun Tzu and the Art of Business (1996); Sun Tzu, The Art of War (1910); Miyamoto Musashi, The Book Of Five Rings (1982); I Ching.

8 . Chu, The Chinese Mind Game, supra note 177 (describing thirty-two of the thirty-six strategies); Chu, The Asian Mind Game, supra note 177 (describing all thirty-six strategies); Brahm, Negotiating in China: 36 Strategies, supra note 177, at xii; Laurence J. Brahm, When Yes means No! (Or Yes Or Maybe) How to Negotiate a Deal in China (2003); Fang, supra note 177.

9 . See, Chu, The Asian Mind Game, supra note 177, at 10. A Google search for either of those phrases locates many cites.

10 . Americans, on the other hand, more often see business, not as war, but as a sport and use sports metaphors: “We are still in the game,” “tackle the problem,” “end run,” “punt,” “game plan,” “huddle,” “cover all bases,” “strike out,” “never get to first base,” “in left field,” “in the ballpark,” “a ballpark figure,” “that’s a home run,” “slam dunk,” “full court press,” etc. See, Richard Saccone, Negotiating With North Korea (2003); Richard Saccone, Negotiating Your Way through Korea 148 (2001).

11 . See Rosalie L. Tung, Managing in Asia: Cross-Cultural Dimensions, in Managing Across Cultures: Issues and Perspectives 139 (Pat Joynt and Malcom Warner eds., 2002).

12 . “Chinese stratagems can be adopted even by decent people as a defensive weapon to keep evils at bay.” See Fang, supra note 177, at 176.

13 . China is well known for economic crime and counterfeit products such as baby formula, instant coffee, and instant soup. March & Wu, supra note 177, at 145.


Download 57.12 Kb.

Share with your friends:




The database is protected by copyright ©de.originaldll.com 2023
send message

    Main page