Stop Arguing On Social Media

Whenever a major story breaks in the social media age, from the supreme court judgement on article 50, to the news that roast potatoes can apparently cause cancer, it sparks a heated debate. In this post-truth world of alternative facts even the US president conducts his battles on Twitter.

But what if you’re less interested in just shouting your view and actually want to try to change people’s minds?

The basics

Is there a way to argue more effectively on social media? Yes, there is, says Sean Jones, an employment and sports law QC, but we might need to change our tactics.

He suggests learning from his mistakes. “Before I became a barrister, I was convinced I was brilliant at argument,” says Jones. “I found that a relentless condescension, refusal to concede any point and a tireless determination to prolong the dispute reliably wore out opponents. They walked away leaving me the victor.”

Sounds like a lot of debate online? That’s not surprising. “Bullying people into silence, as can happen on Twitter, turns out to be a very poor way to persuade them you are right,” he says. “I soon realised that my job was about persuading people.”

To do this, we can to follow a simple formula that works for arguments and then apply it to social media. Lady Helena Kennedy QC says: “I always think the best way to make an argument is to use the acronym Prep. Position, example, reason, repeat position.”

Position

So, first, Jones says, ask yourself what is the point of the argument. “Generally, you want to end up stood together on common ground, so look for what common ground exists and go from there.” Next, lead with your best point.

Lawrence Winston, head of litigation at law firm Squire Patton Boggs, says: “Keep it as simple as possible. The more detailed you make it, the more punch you’ll take out of your point.” Once the debate has got going, keep focused and don’t be repetitive. Don’t send 20 tweets saying the same thing.

And don’t get distracted. “Deal with one point at a time. People who feel a pillar of their argument crumbling will leap to another. Make sure a move to a different point is acknowledged,” adds Jones.

Example

Be prepared to be the one answering questions and justifying your view, ideally with facts and figures. “Many Twitter exchanges begin with an arm-wrestle over who must justify their position,” continues Jones. “If your position is justified, don’t be afraid to accept the burden.”

In fact, taking that more confident approach can help, even if you don’t know your facts, according to research. A study published in the journal Organizational Behavior and Human Decision Processes suggests people will believe a confident speaker before they believe someone more knowledgeable.

However, it is better to engage only when you know your case. “Don’t bluff or seem to be an expert on things you don’t know – you need to have at least some relevant facts or experience,” says Joanne Harris, bestselling author and active Twitter user..

Reason/and be reasonable to others

Make your main point and then add to your argument with short additions to further the debate. Winston says: “Sending bullet points can be more effective than a series of tweets with a longer message and make sure you stay credible.”

If anyone’s reacting badly, remember that they may be misinterpreting you, even if you try and make it clearer by adding emoticons, says Dr Sam Roberts, senior lecturer in psychology at Chester University. “The people you are arguing with can’t see your facial expressions or hear the tone of your voice. People can’t always tell if you’re being lighthearted or voicing a serious belief.” So, aim for clarity, he says, and explain what you meant.

Remember, however, that occasionally your opponent will be engaging with you just for a reaction and it goes without saying that you shouldn’t get personal, even if you’re provoked. “Bear in mind that you may be dealing with someone with mental health issues,” says Harris. “So do no harm. And don’t say anything to anyone that you wouldn’t say to them directly. Shouting on Twitter isn’t the same as shouting at the TV.”

Repeat position

When you’ve made your points, repeat your position and move on. Much of the debate on Twitter is never resolved and the chances are your exchange will probably end before they have been persuaded. “Be courteous and thank them for ‘talking’. You are more likely to resume constructively,” says Jones.

If your debate is not going well, learn to spot when it’s pointless continuing. Harris says: “Bear in mind that however much you try, some people will never listen. Don’t waste too much time with these people.”

Remember that if someone keeps tweeting you, you don’t have to respond. You could consider blocking them, ignoring them or if all else fails, send them one of Jones’s Error Codes.

Selective exposure

If you’re serious about being really open-minded, you might need to check your followers. People on Twitter suffer from what researchers call “selective exposure”. In conflicts, users are more willing to share and to communicate with their ideological friends than foes, according to a study from the Pennsylvania State University. This is where you are surrounded by those who agree with you and your views become entrenched.

“Follow people who disagree with you and listen to them,” concludes Jones. “An advocate wants every aspect of their case tested. And you never know, it might be you who’ll ends up convinced.”

Guardian

Botnets Have Infiltrated The Twitterverse:          Facebook To Introduce Fake News Tools:

 

 

« UK Fraud Hits £1.1bn As Cyber Crime Soars
Cybersecurity In 2017: Recruitment Is The Key »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Endace

Endace

Endace is a leader in network visibility, network recording and packet capture solutions for security, network and application performance monitoring.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Devo Technology

Devo Technology

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

Kintek Group

Kintek Group

Kintek Group provides cybersecurity and managed services to protect organizations from threats that exist inside and outside their networks.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

SIGLA Group

SIGLA Group

SIGLA Group specialize in the design and development of IT and OT solutions, from analysis to design, from implementation to commissioning, as well as consultancy, training and assistance.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.