In the previous article Online Insecurities the concerns online users generally have and the results of such concerns were highlighted and briefly discussed. This article now looks at how to deal with such insecurities by suggesting some work rounds.
The fact someone has chosen to be active online means they DO wish to communicate with other people consequently, they will be reluctant to cease or diminish their interaction. But, bearing in mind the various issues mentioned in the previous article, how is this to be done without adopting the processes outlined in the ‘results’ section of that article?
Three aspects will be considered: Monitoring posts; Argumentative people; and Friend/Visit requests.
Check Facts – Before responding to, or counteracting, any comment, article or post, the writer must first check they have the correct facts. This may take some of their valuable time but it is well worth the investment if they have any uncertainty about valid details.
Edit – Naturally, this applies across the board for all writing. In the current ‘instantaneous’ society many feel under pressure to respond quickly to any communication however, this often leads to the inclusion of spelling, typing and other errors. It should always be born in mind all forms of communication reflect upon the writer’s abilities, character and personality. It is essential time is taken to proofread and edit all interactions.
Timing – When feeling the least bit tired, distracted, under pressure, or uncertain, it is wise for that person to hold back from responding to any communication. It is all too easy to make mistakes, erroneous assumptions, etc. when in such a condition. A few hours or even an overnight delay does not usually matter whereas an inaccuracy may have a long term impact.
Unfortunately, even if it is not too frequently, most online users will have encountered someone who is argumentative or insists upon being rude. It can be difficult knowing how to deal with these. The following may help:
Ignore – In most instances it is best to simply ignore.
Leave – On occasion it may be preferable to leave the discussion all together.
Confirm – If someone feels they must respond, they should ensure they have: all the correct facts; are polite and courteous; and do not become argumentative or rude themselves. (If the person continues in the same vain it would be sensible to stop participating.)
Errors – Where someone has given incorrect or downright wrong information those choosing to respond should again ensure, they have the correct facts and they adopt a polite and courteous, approach.
Social Media ‘Friend’ and ‘Connect’ requests and requests to visit a website or blog are the primary areas under consideration here. Naturally, beside the requester’s character, personality, and appropriateness online user’s concern will also extend to the issues of hackers and viruses. Here are some ideas to help negate the possible consequences of blindly accepting a request.
Profiles – As far as the information is available, profiles, especially About pages and activity lists, should be checked. It is normally possible to gain a reasonable idea of the person, and their validity, from such an examination.
Search – If a user has the least bit concern about a website, blog, etc. it is usually worth searching it/them in Google or some other viable site. It may also be worth asking those the user trusts if they have any knowledge of the site/person.
Software – Users should note when virus protection software stops or highlights a site. (Note: This may sometimes occur with a site the user knows to be valid but that is usually because there is no up-to-date certificate.)
Check – Where the user has access to any site that lists problem companies or sites, they should take time to check through it before accepting any request.
Of course, as will all the lists given, this one is not conclusive.
Overall, when dealing with online insecurities, it generally boils down to common sense and being circumspect about what is shared without diminishing content by distorting information.
As mentioned at the start, this was intended to be part of a complete comprehensive article however, it became too long for modern day readers. The initiating article may be accessed here Online Insecurities.
Disclaimer: Other than being users of Google, neither T. R. Robinson Publications nor T. R. Robinson have any affiliation to the company. Nor do either receive any renumeration for referring to, or mentioning, them.