Skip to main content

Facebook and Risks of “De-contextualization” of Information

  • Chapter
  • First Online:

Abstract

Participation in online social networking sites (hereafter “OSNS”) has dramatically increased in recent years. Services such as the well known Facebook and Myspace but also Frienster, WAYN, Bebo, Google’s Orkut and many others have millions of registered active users and are continuously growing. The most common model of such sites is based on the presentation of the participants’ profiles and the visualisation of their network of relations to others. Also, OSNS connect participants’ profiles to their public identities, using real names and other real-world identification signs (like pictures, videos, e-mail addresses, etc.) in order to enable interaction and communication between real-world subjects. Hence, a site like Facebook cannot purely be considered as a playground for “virtual bodies” in which identities are flexible and disconnected from “real-world bodies”. Not only is the provision of accurate, current and complete registration information from the users encouraged, it is even required by Facebook’s terms of use. This requirement, along with the service’s mission of organizing the real social life of its members, provides important incentives for users to publish only real and valid information about themselves. This accurate information being provided, privacy threats derive from interactions on Facebook. In this chapter, I argue that the main privacy risk on Facebook is the one of “de-contextualization” of the information provided by the participants. According to me, this “de-contextualization” threat is due to three major characteristics of Facebook: 1) the simplification of social relations, 2) the large information dissemination and 3) the network globalization and normalization effects of Facebook. The “de-contextualization” phenomenon not only threatens the right to data protection, meaning the right to control the informational identity a Human being projects in a certain context. More fundamentally it threatens the right to privacy as a Human right: the right of the human being to be a conscious multiple and relational self without unjustified discrimination.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    See detailed statistics on Facebook’s website, http://www.facebook.com/press/info.php?timeline.

  2. 2.

    Ibidem.

  3. 3.

    danah boyd does not capitalize her name.

  4. 4.

    Boyd, D., and N. Ellison. 2007. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13 (1) Article 11., http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html. Boyd and Ellison use “social network site” rather than “social networking site” because “participants are not necessarily ‘networking’ or looking to meet new people; instead, they are primarily communicating with people who are already a part of their extended social network”.

  5. 5.

    See Facebook’s “Statement of Rights and Responsibilities”, http://fr-fr.facebook.com/terms.php.

  6. 6.

    Gross, R., and A. Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 77. New York, ACM.

  7. 7.

    See Nissenbaum, H. 2004. Privacy as contextual integrity. Washington Law Review 79 (1). http://ssrn.com/abstract=534622.

  8. 8.

    This idea was also formulated by Peterson. C. 2009. In Saving face: The privacy architecture of facebook (Draft for comments—Spring), The Selected Works of Chris Peterson, (2009) 9, Available at http://works.bepress.com/cpeterson/1.

  9. 9.

    See Peterson, C. 2009. Saving face: The privacy architecture of facebook. (Draft for comments—Spring), op.cit, abstract.

  10. 10.

    See e.g., Granovetter, M. 1973. The strength of weak ties. American Journal of Sociology 78: 1360–1380. See also Granoetter, M. 1983. The strength of weak ties: A network theory revisited. Sociological Theory 1: 201–233. The privacy relevance of this theory has been highlighted by Strahilevitz. See Strahileviez, L.J. 2005. A social networks theory of privacy. University of Chicago Law Review 72: 919. Originally cited by Gross, R., and A. Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 81. New York, ACM.

  11. 11.

    Gross, R., and A. Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 81. New York, ACM.

  12. 12.

    Ibidem.

  13. 13.

    Boyd D. 2004. Friendster and publicly articulated social networking. in Conference on Human Factors and Computing Systems (CHI 2004), April 24–29, 2. Vienna: ACM, April 24–29.

  14. 14.

    Note that Hatebook.org, the exact opposite version of Facebook, defines itself as “an anti-social utility that disconnects you from all the things you hate”.

  15. 15.

    For more details about Facebook as a heterotopical space, see Sect. 2.1, p. 11.

  16. 16.

    Watts, D.J. 2003. Six degrees: the science of a connected age, 299–300. New York: Norton.

  17. 17.

    L.J. Strahilevitz, op.cit, 47.

  18. 18.

    According to the article Facebook Security Fails Again published on IT-ONLINE, in 2007, the IT security and control firm Sophos revealed that members involuntarily exposed their personal data to millions of strangers, at risk of identity theft. The security company chosed randomly 200 users in the London Facebook network, which is the largest geographic network on the site, with more than 1.2 million members, and found that a staggering 75% allowed their profiles to be viewed by any other member, regardless of whether or not they had agreed to be friends. The reason of this unwanted divulgation of information was that even if you had previously set up your privacy settings to ensure that only friends could view your information, joining a network automatically opened your profile to every other member of the network. It is only in 2009 that Facebook changed the default privacy settings for geographical networks to avoid unwanted open profiles.

  19. 19.

    There is a possibility to indirectly restrict the visibility of the tagged photos by first visiting your profile privacy page and modify the setting next to “Photos Tagged of You”, select the option which says “Customize …”, select the option “Only Me” and then “None of My Networks”. If you would like to make tagged photos visible to certain users you can choose to add them in the box under the “Some Friends” option. In the box that displays after you select “Some Friends” you can type either individual friends or friend lists.

  20. 20.

    See Facebook statistics on http://www.facebook.com/press/info.php?statistics.

  21. 21.

    A. Felt, and D. Evans. 2008. Privacy protection for social networkin APIs. W2SP, May 2008, available at http://www.cs.virginia.edu/felt/privacybyproxy.pdf.

  22. 22.

    See R. Waters, 2009. Facebook applications raise privacy fears. Financial times online, available at http://www.ft.com/cms/s/0/2a58acfa-5c35-11de-aea3-00144feabdc0.html.

  23. 23.

    See Facebook’s Platform Application Terms of Use: “When you install a Developer Application, you understand that such Developer Application has not been approved, endorsed, or reviewed in any manner by Facebook, and we are not responsible for your use of or inability to use any Developer Applications, including without limitation the content, accuracy, or reliability of such Developer Application and the privacy practices or other policies of the Developer. YOU USE SUCH DEVELOPER APPLICATIONS AT YOUR OWN RISK”. Available at http://developers.facebook.com/user_terms.php.

  24. 24.

    See http://epic.org/privacy/facebook/

  25. 25.

    See statistics on http://katrin-mathis.de/wp-mu/thesis/.

  26. 26.

    Gutwirth and De Hert, for example, discussed the distinction by viewing the right to privacy as being a kind of “tool of opacity” whereas, according to the authors, the right to data protection would be a “tool of transparency”. See Gutwirth S., and P. De Hert 2006. Privacy, data protection and law enforcement. Opacity of the individual and transparency of power. In Privacy and the criminal law, eds. E. Claes, A. Duff, and S. Gutwirth, 61–104. Antwerp: Intersentia.

  27. 27.

    See, e.g., Ewing, K.P. 1990. The illusion of wholeness: Culture, self, and the experience of inconsistency. Ethos 18 (3) 251–278 (arguing that people “project multiple, inconsistent self-representations that are context-dependent and may shift rapidly”); Harris, A.P. 1996. Foreword: The unbearable lightness of identity. Berkeley Women’s Law Journal 11: 207–211 (arguing that the problem with any general theory of identity “is that ‘identity itself’ has little substance”); Wicke, J. 1991. Postmodern identity and the legal subject. University of Colorado Law Review 62: 455–463 (noting that a postmodern conception of identity recognizes the self as fragmented and captures “its fissuring by the myriad social discourses which construct it”).

  28. 28.

    See, e.g., Elster, J. 1986. The multiple self. Studies in Rationality and Social Change. Cambridge, MA: Cambridge Univ. Press.

  29. 29.

    Goffman, cited in Giddens, A. 1991. Modernity and self-identity: Self and society in the late modern age. Stanford: Stanford Univ. Press.

  30. 30.

    Warren, S.D., and L.D. Brandeis, 1890. The right to privacy. Harvard Law Review 4 (5): 193–220.

  31. 31.

    See e.g. Niemietz v. Germany, A 251-B, § 29 (ECHR, 16 décembre 1992).

  32. 32.

    Fried, C. 1968. Privacy. Yale Law Journal 77: 475–93.

  33. 33.

    Schoeman, F. 1984. Privacy and intimate information. In Philosophical Dimensions of Privacy: An Anthology, 403–408. Cambridge, MA: Cambridge Univ. Press.

  34. 34.

    H. Nissenbaum, op.cit.

  35. 35.

    James, J. 1975. Why privacy is important. Philosophy and Public Affairs 4 (4): 323–333.

  36. 36.

    Agre, P.E., and M. Rotenberg, eds., Technology and privacy. The new landscape, 3. Cambridge, MA: MIT Press.

  37. 37.

    See e.g., Rouvroy, A., and Y. Poullet, 2009. The right to informational self-determination and the value of self-development. Reassessing the importance of privacy for democracy. In Reinventing Data Protection, eds. S. Gutwirth, P. De Hert, and Y. Poullet. Dordrecht: Springer.

  38. 38.

    See Odièvre v. France (ECHR, 13 February 2003), where the Court acknowledged that the right to privacy (Article 8 of the European Convention on Human Rights) protects, among other interests, the right to personal development.

  39. 39.

    Rouvroy, A. 2008. Privacy, data protection, and the unprecedented challenges of ambient intelligence. Studies in Ethics, Law, and Technology 2 (1): 34.

  40. 40.

    Foucault, M. 1967. Of other spaces. Heterotopias. http://foucault.info/documents/heteroTopia/foucault.heteroTopia.en.html.

  41. 41.

    Ibidem.

  42. 42.

    The same idea can be found in Peterson, C. 2009. Saving face: the privacy architecture of facebook. (Draft for comments—Spring), op.cit, 9 and 35.

  43. 43.

    Agre, P.E., and M. Rotenberg, eds., Technology and privacy. The new landscape, 3. Cambridge, MA: MIT Press.

  44. 44.

    Deleuze, G. 1992. Postscript on the societies of control. 3–7, October_59, Winter Cambridge, MA: MIT Press. available on http://www.spunk.org/texts/misc/sp000962.txt.

  45. 45.

    Ibidem.

  46. 46.

    Williams, R.W. 2005. Politics and self in the age of digital re(pro)ducibility. Fast Capitalism 1 (1). available on http://www.uta.edu/huma/agger/fastcapitalism/1_1/williams.html

  47. 47.

    See Poster, M. 1990. The mode of information, poststructuralism and social context. Cambridge, UK: Polity Press.

  48. 48.

    See Kenneth, L. 1986. The dossier society: Value choices in the design of national information systems. New York: Columbia Univ. Press.

  49. 49.

    Williams, R.W., op.cit.

  50. 50.

    Nissenbaum, H. 2004 Privacy as contextual integrity. Washington Law Review 79 (1): 138.

  51. 51.

    Foucault, M. 1980 Body/power. In Foucault on power/knowledge: selected interviews and other writings 1972–1977, ed. C. Gordon, 91. London: Harvester Press.

  52. 52.

    Article 29 Working Party, Opinion 5/2009 on online social networking, 12 June 2009, p. 4.

  53. 53.

    Article 29 Working Party, Opinion 5/2009 on online social networking, 12 June 2009, p. 3.

  54. 54.

    Ibidem.

  55. 55.

    Ibidem, p. 4.

  56. 56.

    According to Facebook CPO Chris Kelly, only 20% of users ever touch their privacy settings. See. Stross Randall, “When Everyone’s a Friend, Is Anything Private?”, The New York Times, March 7, 2009, available at http://www.nytimes.com/2009/03/08/business/08digi.html.

  57. 57.

    See Rapid Press Release “Eurobarometer survey reveals that EU citizens are not yet fully aware of their rights on data protection”, IP/08/592, 17 April 2008.

  58. 58.

    See Eurobarometer, “Data Protection in the European Union: Citizens’ perceptions”, Analytical report, February 2008, available at http://ec.europa.eu/public_opinion/flash/fl_225_en.pdf.

  59. 59.

    See Artico v. Italy, 37, (ECHR, 13 May 1980), 15–16, § 33, and Stafford v. the United Kingdom (GC), 46295/99, § 68 (ECHR 2002-IV).

  60. 60.

    Article 29 Working Party, Opinion 5/2009 on online social networking, 12 June 2009, p. 11.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Franck Dumortier .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Dumortier, F. (2010). Facebook and Risks of “De-contextualization” of Information. In: Gutwirth, S., Poullet, Y., De Hert, P. (eds) Data Protection in a Profiled World. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-8865-9_7

Download citation

Publish with us

Policies and ethics