Stop Arguing On Social Media

Whenever a major story breaks in the social media age, from the supreme court judgement on article 50, to the news that roast potatoes can apparently cause cancer, it sparks a heated debate. In this post-truth world of alternative facts even the US president conducts his battles on Twitter.

But what if you’re less interested in just shouting your view and actually want to try to change people’s minds?

The basics

Is there a way to argue more effectively on social media? Yes, there is, says Sean Jones, an employment and sports law QC, but we might need to change our tactics.

He suggests learning from his mistakes. “Before I became a barrister, I was convinced I was brilliant at argument,” says Jones. “I found that a relentless condescension, refusal to concede any point and a tireless determination to prolong the dispute reliably wore out opponents. They walked away leaving me the victor.”

Sounds like a lot of debate online? That’s not surprising. “Bullying people into silence, as can happen on Twitter, turns out to be a very poor way to persuade them you are right,” he says. “I soon realised that my job was about persuading people.”

To do this, we can to follow a simple formula that works for arguments and then apply it to social media. Lady Helena Kennedy QC says: “I always think the best way to make an argument is to use the acronym Prep. Position, example, reason, repeat position.”

Position

So, first, Jones says, ask yourself what is the point of the argument. “Generally, you want to end up stood together on common ground, so look for what common ground exists and go from there.” Next, lead with your best point.

Lawrence Winston, head of litigation at law firm Squire Patton Boggs, says: “Keep it as simple as possible. The more detailed you make it, the more punch you’ll take out of your point.” Once the debate has got going, keep focused and don’t be repetitive. Don’t send 20 tweets saying the same thing.

And don’t get distracted. “Deal with one point at a time. People who feel a pillar of their argument crumbling will leap to another. Make sure a move to a different point is acknowledged,” adds Jones.

Example

Be prepared to be the one answering questions and justifying your view, ideally with facts and figures. “Many Twitter exchanges begin with an arm-wrestle over who must justify their position,” continues Jones. “If your position is justified, don’t be afraid to accept the burden.”

In fact, taking that more confident approach can help, even if you don’t know your facts, according to research. A study published in the journal Organizational Behavior and Human Decision Processes suggests people will believe a confident speaker before they believe someone more knowledgeable.

However, it is better to engage only when you know your case. “Don’t bluff or seem to be an expert on things you don’t know – you need to have at least some relevant facts or experience,” says Joanne Harris, bestselling author and active Twitter user..

Reason/and be reasonable to others

Make your main point and then add to your argument with short additions to further the debate. Winston says: “Sending bullet points can be more effective than a series of tweets with a longer message and make sure you stay credible.”

If anyone’s reacting badly, remember that they may be misinterpreting you, even if you try and make it clearer by adding emoticons, says Dr Sam Roberts, senior lecturer in psychology at Chester University. “The people you are arguing with can’t see your facial expressions or hear the tone of your voice. People can’t always tell if you’re being lighthearted or voicing a serious belief.” So, aim for clarity, he says, and explain what you meant.

Remember, however, that occasionally your opponent will be engaging with you just for a reaction and it goes without saying that you shouldn’t get personal, even if you’re provoked. “Bear in mind that you may be dealing with someone with mental health issues,” says Harris. “So do no harm. And don’t say anything to anyone that you wouldn’t say to them directly. Shouting on Twitter isn’t the same as shouting at the TV.”

Repeat position

When you’ve made your points, repeat your position and move on. Much of the debate on Twitter is never resolved and the chances are your exchange will probably end before they have been persuaded. “Be courteous and thank them for ‘talking’. You are more likely to resume constructively,” says Jones.

If your debate is not going well, learn to spot when it’s pointless continuing. Harris says: “Bear in mind that however much you try, some people will never listen. Don’t waste too much time with these people.”

Remember that if someone keeps tweeting you, you don’t have to respond. You could consider blocking them, ignoring them or if all else fails, send them one of Jones’s Error Codes.

Selective exposure

If you’re serious about being really open-minded, you might need to check your followers. People on Twitter suffer from what researchers call “selective exposure”. In conflicts, users are more willing to share and to communicate with their ideological friends than foes, according to a study from the Pennsylvania State University. This is where you are surrounded by those who agree with you and your views become entrenched.

“Follow people who disagree with you and listen to them,” concludes Jones. “An advocate wants every aspect of their case tested. And you never know, it might be you who’ll ends up convinced.”

Guardian

Botnets Have Infiltrated The Twitterverse:          Facebook To Introduce Fake News Tools:

 

 

« UK Fraud Hits £1.1bn As Cyber Crime Soars
Cybersecurity In 2017: Recruitment Is The Key »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.