Você está na página 1de 5

Debate preparation template

First speaker guide

Topic Are social networking sites useful or harmful to people?


Speakers’ names GERALDINE RAMOS DIAZ/MIGUEL CALDERON

Speaker’s position NEGATIVE


Greeting and Introduction
Good afternoon, chairperson, opposition and audience.

Today we will have a debate where the topic to be discussed is "Are social networking sites
useful or harmful to people?" We have two opinions, one in favor and one against, where
Miguel will make the debate from the positive side and Geraldine from the negative side of
the situation.

Outline your team's case:


a) Your points:
I will be speaking about...

● Scams through social networks

● Falsification of identity

● Social networks addiction


b) Second speaker's points:
Our second speaker will be talking about....


Your First Point
State your argument:
My first point is...

When we surf the Internet we are always exposed to threats. These can be very varied.
Different types of malware such as viruses, Trojans, ransomware ... But also other risks that
come through messages, emails and that normally need user interaction. In recent times,
threats have increased through these means, as they take advantage of certain user
vulnerabilities. We can find some types of scams such as:

Fraudulent links
Assumptions Awards
Easy money
Fake offers

Fraudulent links are sent by attackers through social networks like Facebook, but also
instant messaging programs. They look for the victim to enter that link and from there take
them to a fraudulent website or even download a malicious file, many links can be sent by a
friend with a simple video without knowing that it is a malicious file, You have to pay
attention to these stuff. Never click on links that we consider strangers.

The alleged prizes often come from emails or instant messaging. I believe that we have all
ever received a message of this type where we are told that we have been rewarded with
something. It may well be a trip, certain money that has touched us, a computer, a cell phone
or a vehicle among others, in return they ask to fill out a form, through which the attacker is
done with the victim's data. They can also even ask for certain money for the procedures
caused by the sending of the prize. If you receive a similar type of message, it is best to
ignore and delete it. If we can, even avoid opening it.

Easy money is related to cryptocurrencies. Promises to generate money quickly and easily
using our computer. They tell us to install a program to mine digital currencies. It is true that
there are ways to do it legitimately, but in many cases they only seek to take advantage of
the victim.

False offers, on occasion we have seen an ad to buy something for a price that is too low.
They offer incredible discounts and tempt the user to buy or at least enter that page. On
many occasions behind that link there is some type of fraud. In these cases it is essential to
consult a website well before buying anything. See your reputation, user comments, what
they sell ...

Your Second Point


State your argument:
My second point is...

Impersonation in social networks is common everyday, and occurs when someone takes the
name, accounts or personal information of another person to impersonate them. Identity
theft cases have been known on the Internet for a long time, but today criminals take
advantage of people's trust and popularity in social networks.

Although it is usually believed that this only happens to celebrities and large companies, the
truth is that it can happen to anyone. Attackers can be large hackers hired to violate social
media errors with attacks and steal large amounts of personal information to commit
criminal acts. But it can also be common users who create fake accounts to act under
anonymity and harm third parties.

A very popular case was the usurpation of the Facebook profile of Mark Zuckerberg, the
creator of that social network! Someone managed to get the password and began to spread
public messages against Facebook, swaggering on its mission.

But, eye, you don't have to be Zuckerberg to make it happen to us. It can also happen to us,
and to emotional damage, there are cases of theft of bank account numbers, etc. So it is
better that we know how to recognize these situations and how to act in this regard
The usurpation of identity on social platforms such as Twitter, Facebook has risen
dramatically in recent years. While only in January 2010, this modality came to be 8.3% of
all known cases, by the end of the same year, phishing on social networks already accounted
for 84.5%, according to a Microsoft study in which 600 million PCs are analyzed around the
world.

Your Third Point


State your argument:
My third point is…

Social networks such as Twitter or Facebook have changed the way we relate and have
come to influence, in some cases, our behavior. Each person uses social networks with a
purpose: to disseminate their work, publicize their company, sell products and services or
contact former friends. So the way in which they are used affects the individual.

Since its inception, many studies have been carried out with the objective of knowing how
they affect our behavior and the way we value ourselves. The results obtained have shown
that its excessive use contributes on the one hand, to the increase of stress and the feeling
of loneliness and on the other, to the decrease of the feeling of happiness.

Some studies have even linked addiction to social networks such as Facebook, Instagram
and Twitter with low self-esteem. Results that have been supported by the presence of
depressive symptomatology and lack of social skills in them. The reason is that before so
many publications of the lives of others, the addicted person makes continuous
comparisons and ends up thinking that his life is boring, miserable and empty. Without
realizing that the time he could be devoting to enriching it, he is wasting it.

Closing statement
Chairperson, opposition and members of the audience, in conclusion…

The conclusion that I have reached thanks to this is that although social networks are a
great technological advance, you have to be careful with everything you publish and the
information you give because an adolescent error can be a big problem when you are a adult
because you can not go back and delete is photo or video that you would not wish to have
uploaded.

There to be careful with the information that is shared and the personal data that we can
give us our family or our friends since there will always be a person aware of our
movements to harm you

Second speaker guide

Speaker’s position (Affirmative/Negative)


Expressing disagreement with first speaker’s arguments

I disagree on …. because ….
Why do you disagree with first speaker’s points?

Briefly State the Points You Will Make


Today I will be talking to you about:

Your First Point


State your argument:
My first point is...

What's is the information that supports your argument?

Give examples, facts, figures, etc.:

Your Second Point


State your argument:
My second point is...

What's the information that supports your argument?

Give examples, facts, figures, etc.:

Your Third Point


State your argument:
My third point is...

What's the information that supports your argument?

Give examples, fact, figures etc.:


Closing statement
Chairman, opposition and members of the audience, in conclusion...

Você também pode gostar