Should I protect my tweets?
- 23 February, 2011 09:14
When I signed up for a Twitter account in the summer of 2009 I spent some time thinking about whether or not I should protect my tweets. As a novice Twitter user, I had to decide whether the benefits of protecting my tweets outweighed the drawbacks. Looking back, I do not regret my decision to protect my tweets, and I'll tell you why.
When a person's tweets are protected, all followers of that person need to be approved by that person. This works in some ways the same as approving friends and colleagues on Facebook or LinkedIn. By protecting my tweets, I would be able to fend off spammers and bots on Twitter. As I understand it, bots on Twitter are computer programs that automatically send you an @message if your tweets include certain keywords.
If spammers and bots see any advantage to being able to follow me, I want no part of that. The downside to protecting my tweets is that they are not findable by people who are searching Twitter. My tweets also cannot be easily retweeted using the retweet button on Twitter. However, my tweets can be retweeted via standard copy and paste, which is fine by me. Just because I protect my tweets does not mean I don't want my tweets to be retweeted.
Several friends of mine have tried to convince me that by protecting my tweets I am being antisocial. I see it as quite the opposite. By protecting my tweets I am fending off spammers and enhancing the Twitter experience for others. Every person who follows me is someone I have accepted as a follower. By and large, these tend to be quite thoughtful people working as librarians, educators, journalists, free and open-source software advocates and nonprofit change-makers. If those are the kinds of people you'd like to follow, browse through my followers list to see if you find people you want to follow. My followers list is viewable to any and all – as is the list of people that I myself follow. As you might imagine, there is a quite a large overlap between these two lists, as I tend to follow people who follow me back.
I came to the conclusion that I needed to protect my tweets when I went to look at the people following Tim O'Reilly, founder of O'Reilly Media and one of the most interesting thinkers on Twitter. Tim's tweets are quite fascinating, but even more fascinating are the tweets of people who follow Tim – the people who think that Tim's tweets are fascinating. Locating those people is nearly impossible, though, because Tim's followers list is polluted with so many spammers and bots. Finding real people in that list could take you hours and hours.
One last reason I protect my tweets is by looking at the kinds of other people on Twitter who protect their tweets. This is currently a very small percentage, smaller than one percent of all Twitter users. Yet if you examine the kinds of people who protect their tweets, a large majority of these people are what I would characterize as deeply thoughtful people. If deeply thoughtful people tend to protect their tweets, then maybe my decision to protect my tweets was a sound one.
I should mention one other drawback to protecting your tweets. Some third-party Twitter services do not work if your tweets are protected. I find this to be mildly annoying, but not a large problem. I can get by quite well without those services. The third-party Twitter service I find most useful, Manage Flitter, works fine for Twitter accounts that are protected.
Twitter itself provides very little guidance or advice on whether you should protect your tweets. Perhaps Twitter might link to this blog post in their settings page to help Twitter newcomers with this decision.
The author is an educator and community-builder in the Washington DC-area. He can be reached at email@example.com and on Twitter at http://www.twitter.com/philshapiro
Previous Community Voices blog posts.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- 2014 Foundations of Pathways | 9 Executive Core Business Competencies
- CMO's Customer Engagement in a Multi-Channel Marketing World
- 5 Ways To Be More Productive At Work
- ERP Selection: Finding the Right Fit
- Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
- OAIC releases privacy impact assessment guide for consultation
- Some Australian businesses 'unlikely' to be ready for Privacy Act changes: survey
- BYOA 'shadow IT' grows in the enterprise: Telsyte
- Cost of a Privacy Act breach could extend to ongoing audits: legal expert
- How Hunter Water is saving $50k a year in software licences
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Leading insurance provider’s desktop virtualization deployment
QBE insurance group met the challenge of swiftly deploying a desktop virtualization solution, after practically outsourcing its entire IT department overnight. Read their story to learn how to allow users a comfortable desktop while ensuring that IT can maintain control.
Best Practices in Data Protection Monitoring
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.
Whitepaper: Preventing Data Loss Takes More Than MDM
You need to secure your BYOD devices—but MDM alone isn't enough to prevent data loss. Read this whitepaper—Data Loss Prevention: When MDM Is Not Enough—to learn how to combat MDM shortcomings. See how to add cross-platform security, implement protection policies, and address risks in consumer apps.