Stop Arguing On Social Media

Whenever a major story breaks in the social media age, from the supreme court judgement on article 50, to the news that roast potatoes can apparently cause cancer, it sparks a heated debate. In this post-truth world of alternative facts even the US president conducts his battles on Twitter.

But what if you’re less interested in just shouting your view and actually want to try to change people’s minds?

The basics

Is there a way to argue more effectively on social media? Yes, there is, says Sean Jones, an employment and sports law QC, but we might need to change our tactics.

He suggests learning from his mistakes. “Before I became a barrister, I was convinced I was brilliant at argument,” says Jones. “I found that a relentless condescension, refusal to concede any point and a tireless determination to prolong the dispute reliably wore out opponents. They walked away leaving me the victor.”

Sounds like a lot of debate online? That’s not surprising. “Bullying people into silence, as can happen on Twitter, turns out to be a very poor way to persuade them you are right,” he says. “I soon realised that my job was about persuading people.”

To do this, we can to follow a simple formula that works for arguments and then apply it to social media. Lady Helena Kennedy QC says: “I always think the best way to make an argument is to use the acronym Prep. Position, example, reason, repeat position.”

Position

So, first, Jones says, ask yourself what is the point of the argument. “Generally, you want to end up stood together on common ground, so look for what common ground exists and go from there.” Next, lead with your best point.

Lawrence Winston, head of litigation at law firm Squire Patton Boggs, says: “Keep it as simple as possible. The more detailed you make it, the more punch you’ll take out of your point.” Once the debate has got going, keep focused and don’t be repetitive. Don’t send 20 tweets saying the same thing.

And don’t get distracted. “Deal with one point at a time. People who feel a pillar of their argument crumbling will leap to another. Make sure a move to a different point is acknowledged,” adds Jones.

Example

Be prepared to be the one answering questions and justifying your view, ideally with facts and figures. “Many Twitter exchanges begin with an arm-wrestle over who must justify their position,” continues Jones. “If your position is justified, don’t be afraid to accept the burden.”

In fact, taking that more confident approach can help, even if you don’t know your facts, according to research. A study published in the journal Organizational Behavior and Human Decision Processes suggests people will believe a confident speaker before they believe someone more knowledgeable.

However, it is better to engage only when you know your case. “Don’t bluff or seem to be an expert on things you don’t know – you need to have at least some relevant facts or experience,” says Joanne Harris, bestselling author and active Twitter user..

Reason/and be reasonable to others

Make your main point and then add to your argument with short additions to further the debate. Winston says: “Sending bullet points can be more effective than a series of tweets with a longer message and make sure you stay credible.”

If anyone’s reacting badly, remember that they may be misinterpreting you, even if you try and make it clearer by adding emoticons, says Dr Sam Roberts, senior lecturer in psychology at Chester University. “The people you are arguing with can’t see your facial expressions or hear the tone of your voice. People can’t always tell if you’re being lighthearted or voicing a serious belief.” So, aim for clarity, he says, and explain what you meant.

Remember, however, that occasionally your opponent will be engaging with you just for a reaction and it goes without saying that you shouldn’t get personal, even if you’re provoked. “Bear in mind that you may be dealing with someone with mental health issues,” says Harris. “So do no harm. And don’t say anything to anyone that you wouldn’t say to them directly. Shouting on Twitter isn’t the same as shouting at the TV.”

Repeat position

When you’ve made your points, repeat your position and move on. Much of the debate on Twitter is never resolved and the chances are your exchange will probably end before they have been persuaded. “Be courteous and thank them for ‘talking’. You are more likely to resume constructively,” says Jones.

If your debate is not going well, learn to spot when it’s pointless continuing. Harris says: “Bear in mind that however much you try, some people will never listen. Don’t waste too much time with these people.”

Remember that if someone keeps tweeting you, you don’t have to respond. You could consider blocking them, ignoring them or if all else fails, send them one of Jones’s Error Codes.

Selective exposure

If you’re serious about being really open-minded, you might need to check your followers. People on Twitter suffer from what researchers call “selective exposure”. In conflicts, users are more willing to share and to communicate with their ideological friends than foes, according to a study from the Pennsylvania State University. This is where you are surrounded by those who agree with you and your views become entrenched.

“Follow people who disagree with you and listen to them,” concludes Jones. “An advocate wants every aspect of their case tested. And you never know, it might be you who’ll ends up convinced.”

Guardian

Botnets Have Infiltrated The Twitterverse:          Facebook To Introduce Fake News Tools:

 

 

« UK Fraud Hits £1.1bn As Cyber Crime Soars
Cybersecurity In 2017: Recruitment Is The Key »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

Guardian Angel Cyber

Guardian Angel Cyber

Guardian Angel Cyber, is your trusted ally in safeguarding your digital assets and online presence.

Validia

Validia

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative AI.

Spectrotel

Spectrotel

Spectrotel, a trusted provider of Managed Network Solutions, elevates your network with solutions built on cutting-edge technologies.