facebook linkedin twitter

Computerware Blog

Tip of the Week: How to Make Social Media a Little Less Political

Tip of the Week: How to Make Social Media a Little Less Political

Social media platforms have proven their worth as a communication tool and advertising platform… something that many political campaigns are embracing with an election looming. As a result, many people have found their feeds cluttered with campaign ads. The thing is, the ads aren’t always welcomed on a platform that many use to keep up with friends and family—even less so if the content doesn’t align to their political views.

Fortunately, there are ways that you can see fewer of these ads on your Facebook and Instagram feeds.

This capability was included as a part of Facebook’s overarching campaign to promote a more fair election, which also features the platform’s new information center. First deployed in June, this feature gives a user the capability to block all advertisements from candidates, Super PACs, and other organizations that feature social, political, or electoral topics.

If an advertisement needs to disclose that a group or interest funded the ad, a user can prevent it from appearing as they scroll.

How to Disable Certain Ad Topics

Facebook and Instagram each offer the capability to disable ads from a variety of topics from appearing on your feed, including politically-motivated messaging.

Facebook

Adjusting your ads on Facebook is simple. Navigate to Settings & Privacy on either the application or the website, and from there, follow Settings > Ads > Ad Preferences > Ad Topics. There, you’ll see the different ad topics that you can deactivate, minimizing the ads that display for these topics.

If you come across an ad as you’re browsing your Facebook feed, you can also take action from there. Political ads should have a tag in the top-right corner that states the ad came from a Confirmed Organization. Clicking on that tag will show you who it was who paid for the ad, why you’re specifically seeing the ad, and again, the option to see fewer ads surrounding the topic.

To learn more about Facebook ads, check out the official documentation.

Instagram

As Instagram is owned by Facebook, the process to minimize the ads you see is quite similar. From your Instagram account, go to Settings, Privacy and Security, and tell Instagram which topics you want to See fewer ads for.

You can also deactivate ads mid-stream, by selecting Paid for by and then See fewer ads like this.

Find out more about Instagram advertisements here.

Don’t forget to subscribe to our blog for more handy IT tips!

Partition Your Network to Improve Productivity
Is Blockchain Still a Big Deal? (It Sure Is)
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 20, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Backup Productivity Managed Service Provider Business Hosted Solutions Email Productivity Malware IT Services Efficiency Saving Money Google Innovation Small Business Computer User Tips Collaboration Quick Tips VoIP IT Support Data Backup IT Support Network Smartphones Mobile Devices Business Continuity communications Gadgets Disaster Recovery Microsoft Office Data Recovery Android Social Media Cybersecurity Smartphone Upgrade Mobile Office Server Communication Phishing Virtualization Miscellaneous Mobile Device Management Ransomware Windows Passwords Mobile Device Holiday Users Operating System Vendor Management Managed IT Services Outsourced IT Apps Tech Term Windows 10 BDR Internet of Things Facebook Remote Monitoring Unified Threat Management Automation BYOD Analytics Managed IT services Remote Computing Data Management Apple Mobile Computing Windows 10 WiFi The Internet of Things Cloud Computing Marketing Browser History Artificial Intelligence Training Firewall Business Technology Save Money Spam Help Desk Encryption Alert App Big data Health Two-factor Authentication Bandwidth Office Managed Service Covid-19 Office 365 Budget Information Technology IT Consultant Access Control Going Green Gmail Windows 7 Hard Drives Government Managed IT Bring Your Own Device Cybercrime VPN Antivirus Maintenance Printer Content Filtering Information Hiring/Firing Healthcare Outlook Windows 8 Blockchain Recovery Saving Time Wi-Fi Computers Wireless Technology Employer-Employee Relationship Retail Search Virus Cost Management Tech Support Remote Work Networking Lithium-ion Battery Best Practice Computing IBM Money Customer Service Document Management Augmented Reality Data Security It Management Data Loss Travel Humor Education Conferencing Hacking Project Management Update iPhone Phone System SaaS Downtime Current Events Mobility Customer Relationship Management Wireless Law Enforcement Proactive IT Computer Repair Running Cable PowerPoint Storage Website Patch Management Solid State Drive Compliance Data storage Flexibility Administration Applications Voice over Internet Protocol Twitter Intranet Value Data Breach Laptop Password Avoiding Downtime Legal Hacker Risk Management Regulations File Sharing Hard Drive Save Time Vendor Management Virtual Desktop Disaster Router Excel End of Support Social Hosted Solution Social Engineering Comparison Tablet Vulnerabilities Robot Securty Company Culture DDoS Meetings Private Cloud Social Networking Fax Server Word Scam Black Market Telephony Machine Learning Cryptocurrency Cortana Telephone Systems Business Growth Digital Websites Employee/Employer Relationship Net Neutrality Monitoring Business Intelligence Paperless Office Cooperation Chrome Google Maps Software as a Service Digital Payment User Sports Processor Virtual Reality Uninterrupted Power Supply Multi-factor Authentication Specifications Politics Safety User Error Telephone Automobile Vulnerability Co-managed IT Emails Computer Accessories Documents Bitcoin Smart Devices Chromebook Trending IT service Teamwork Computing Infrastructure Heating/Cooling Hack Data Protection Solutions Entertainment Mouse Employees Gaming Console How To Video Conferencing Professional Services Download Downloads Lifestyle Statistics Bluetooth Text Messaging Programming Integration Webcam Network Congestion Distribution eWaste Redundancy Microchip Taxes Memory Managed Services Provider Distributed Denial of Service Google Docs Experience Streaming Media Evernote Cost Public Cloud Licensing Virtual Assistant Cleaning How To Inbound Marketing Monitors Processors Managed Services Office Tips Managed IT Service USB Identity Theft Start Menu Tech Terms Pain Points Presentation Notifications Mobile Technology YouTube Unified Communications Settings Managing Costs In Internet of Things Drones Virtual Private Network Microsoft 365 Google Drive Windows Server 2008 online Currency Wireless Headphones Browsers FinTech Upselling Migration Development Connected Devices Medical IT Trend Micro Spyware Mobile Payment Scalability Permissions Language Webinar Network Management Security Cameras Threats Digital Signature Video Surveillance Motion Sickness Electricity Printing Equifax User Tip Data Storage Fleet Tracking Proactive Maintenance LinkedIn Navigation Virtual Machine Device security Procurement MSP Saving ZTime Messenger Tracking switches Writing Nanotechnology Data Analysis Organization Social Network Music Desktop Finance eCommerce Rental Service cache Television PCI DSS Asset Tracking SQL Server Harddrive PDF Cabling Skype Business Cards Communitications Service Level Agreement GDPR Managing Risk Debate Web Server WannaCry Archive Upgrades Startup Printers Time Management Freedom of Information LiFi Unified Threat Management Backup and Disaster Recovery Tech Hypervisor GPS Best Available Keyboard Administrator Corporate Profile Supply Chain Management Username Books Workers Best Practives Screen Reader Fileless Malware AI Customer Resource management Hybrid Cloud Point of Contact Internet Service Provider Gamification Holidays External Harddrive Domains Supercomputer Assessment SharePoint Smart Tech Proxy Server Regulations Compliance Azure Worker Tip of the week Work/Life Balance Piracy IT Assessment Upload Modem Strategy Public Speaking Google Calendar Deep Learning Samsung Touchscreen News Visible Light Communication Fiber-Optic Database Term 3D Ebay Shortcut VoIP Microserver HTML Electronic Medical Records Remote Working Transportation Thin CLient Reading Recycling IT consulting Directions Supply Chains Telephone System Display Entrepreneur G Suite Knowledge Analytic Mobile Security Recording Optimization Smart Phones Troubleshooting Employer Employee Relationship Consultation Multi-Factor Security Dark Web Financial Data Free Resource Environment Product Reviews Software License Electronic Health Records Trends SSID HIPAA Hacks Physical Security Technology Tips Get More Done Leadership Electronic Payment Relocation Tablets Fake News Advertising Flash Printer Server Fraud Memes Tactics Processing Adminstration Banking Pirating Information Competition Botnet Audit CIO Read Turn Key Devices Health IT Windows XP Trojan Wasting Time Sync Staffing Google Wallet UTM Managing IT Services Content Logistics Virtual Machines Business Owner Data Warehousing Legislation Bookmark Telework Error Emergency Hard Drive Disposal Society Organize IT Plan Surveillance Enterprise Resource Planning Cyber security IP Address CCTV Access Device Management Displays Reliable Computing Human Resources Microsoft Excel Business Managemenet email scam IT Addiction Google Play Telephone Service Business Metrics Application Computer Malfunction Computer Care Content Management Micrsooft Accountants Remote Workers A.I. Employer/Employee Relationships Financial CrashOverride 3D Printing Managing Stress Capital Regulation Personal Information Productuvuty

toner1