Skip to main content

We Are All Connected to Facebook … by Facebook!

  • Chapter
  • First Online:

Abstract

Numerous websites have implemented the Facebook “Like” button to let Facebook members share their interests, thus promoting websites or news items. It is, thus, an important business tool for content providers. However, the tool is also used to place cookies on the user’s computer, regardless of whether a user actually uses the button when visiting a website. This allows Facebook to track and trace users and to process their data. It appears that non-Facebook members can also be traced via the Like button. This means that Facebook’s data collection practices reach far beyond their own platform and membership. Owing to the proliferation of Like buttons, Facebook has a potential connection with all web users. Web activity can be linked to individual accounts, or a separate data set can be created for individuals who are not (yet) Facebook members. The hidden collection of data on browsing behavior and the creation of individual data sets has ramifications for the privacy of individuals. Privacy issues arising from thirdparty cookie use and connectivity of web activity and devices will be discussed, using the technical process behind the Facebook Like button as an example.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Ung vs. Facebook, Class action complaint, Superior Court of the State of California, County of Santa Clara, Case No. 111CV200467, filed 05/09/2011.

  2. 2.

    “Like Button—Facebook Developers,” accessed 22 March 2011, http://developers.facebook.com/docs/reference/plugins/like.

  3. 3.

    “The Value of a Liker—Facebook,” accessed 22 March 2011, http://www.facebook.com/notes/facebook-media/value-of-a-liker/150630338305797.

  4. 4.

    “Facebook Like Box Usage Statistics,” accessed 22 March 2011, http://trends.builtwith.com/widgets/Facebook-Like-Box.

  5. 5.

    “Facebook Stats Likers,” accessed 29 Sept. 2010, http://www.insidefacebook.com/2010/09/29/facebook-stats-likers/.

  6. 6.

    “Facebook Like Usage Statistics,” accessed 22 March 2011, http://trends.builtwith.com/widgets/Facebook-Like.

  7. 7.

    There are, however, more privacy friendly initiatives which focus on audience segregation and controlled disclosure of personal information. For instance, Clique allows users to have several ‘faces’ in one account. See http://clique.primelife.eu/. This social networking site is one of the results of the EU FP7 PrimeLife project.

  8. 8.

    HTTP stands for Hyper Text Transfer Protocol, the programming language used for internet traffic. An HTTP request is a request for a specific piece of content sent from the user’s computer to a web server. The web server replies by sending the requested content. If the content is not available, the reply includes an error code.

  9. 9.

    This scenario does not apply anymore since Facebook changed its systems after the publication of my initial research findings (Roosendaal 2010). In a communication to the Hamburg Data Protection Authority (Germany) Facebook stated that the tracking of nonusers was the result of a ‘bug’ in their software development kit.

  10. 10.

    For instance: www.slideshare.net  .

  11. 11.

    Another reason to take the individual perspective is that privacy and data protection legislation is based on the privacy interest of individuals. Taking the perspective of a commercial company would come to a weighing of interests (conform Article 7(f) of the Data Protection Directive (Directive 95/46/EC)) and, thus, legally imply an assumption that the commercial business interest is a valid interest. At least, this assumption cannot be made in general.

  12. 12.

    There have been several efforts define the concept of privacy clearly and concisely. The definition will not be discussed here. For those interested in the discussion and efforts, see, for instance, the valuable work done by Parent (1983), who approaches the concept from different views and disciplines, and the extensive work by Solove (2002, 2006, 2008).

  13. 13.

    This distinction between active and passive components is inspired by Isaiah Berlin’s theory on positive and negative freedoms:(Berlin 1958).

  14. 14.

    In this respect, the public outcry on the Like button being available at the website of the National Health Service (NHS) in the UK is a case in point (see, Kirk 2010).

  15. 15.

    Compare the famous quote by Skyler, 18: “If you’re not on MySpace, you don’t exist!” (Quote posted by her mother Kathy Sierra at  http://headrush.typepad.com/creating passionate users/2006/03/ultrafast relea.html , no longer available (cf. boyd 2008).

References

  • Agre, Philip E., and Marc Rotenberg. 1997. Technology and privacy: The new landscape. Cambridge: MIT Press.

    Google Scholar 

  • Berlin, Isaiah. 1958. Two concepts of liberty. Oxford: Clarendon Press.

    Google Scholar 

  • boyd, danah. 2008. Why youth heart social network sites: The role of networked publics in teenage social life. In Youth, identity, and digital media, ed. David Buckingham, 119–142. Cambridge: MIT Press.

    Google Scholar 

  • boyd, danah, and Eszter Hargittai. 2010. Facebook privacy settings: Who cares? First Monday 15:8.

    Google Scholar 

  • Burbary, Ken. 2009. Five reasons companies should be integrating social media with Facebook connect. http://www.kenburbary.com/2009/08/five-reasons-companies-should-be-integrating-social-media-with-facebook-connect/. Accessed 20 Aug 2009.

    Google Scholar 

  • Dwyer, Catherine A. 2009. Behavioral targeting: A case study of consumer tracking on Levis.Com. Paper presented at the 15th American Conference on Information Systems, San Francisco, California.

    Google Scholar 

  • Goffman, Erving. 1959. The presentation of self in everyday life. Garden City: Doubleday & Company.

    Google Scholar 

  • Hekman, Susan J. 2004. Private selves, public identities: Reconsidering identity politics. University Park: The Pennsylvania State Univ. Press.

    Google Scholar 

  • Kirk, J. 2010. NHS link to Facebook raises privacy concerns. http://www.pcworld.com/businesscenter/article/211711/nhs_link_to_facebook_raises_privacy_concerns.html. Accessed 7 Dec 2011.

    Google Scholar 

  • Lloyd, Ian J. 2008. Information technology law. Oxford: Oxford Univ. Press.

    Google Scholar 

  • Martin, David, Hailin Wu, and Adil Alsaid. 2003. Hidden surveillance by web sites: Web bugs in contemporary use. Communications of the ACM 46 (12): 258–264.

    Article  Google Scholar 

  • Nissenbaum, Helen. 2004. Privacy as contextual integrity. Washington Law Review 79: 119–158.

    Google Scholar 

  • Parent, William A. 1983. Privacy, morality, and the law. Philosophy and Public Affairs 12 (4): 269–288.

    Google Scholar 

  • Roosendaal, Arnold. 2010. Facebook tracks and traces everyone: Like this! Tilburg Law School Research Paper No. 03/2011. http://ssrn.com/abstract=1717563. Accessed 30 Nov 2010.

    Google Scholar 

  • Rouvroy, Antoinette, and Yves Poullet. 2009. The right to informational self-determination and the value of self-development: Reassessing the importance of privacy for democracy. In Reinventing Data Protection, ed. Serge Gutwirth et al. 45–76. Berlin: Springer.

    Google Scholar 

  • Schwartz, Paul M. 1999. Privacy and democracy in cyberspace. Vanderbilt Law Review 52: 1609–1701.

    Google Scholar 

  • Solove, Daniel J. 2002. Conceptualizing privacy. California Law Review 90 (4): 1087–1156.

    Article  Google Scholar 

  • Solove, Daniel J. 2006. A taxonomy of privacy. University of Pennsylvania Law Review 154 (3): 477–560.

    Article  Google Scholar 

  • Solove, Daniel J. 2008. Understanding privacy. Cambridge/London: Harvard Univ. Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arnold Roosendaal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Roosendaal, A. (2012). We Are All Connected to Facebook … by Facebook!. In: Gutwirth, S., Leenes, R., De Hert, P., Poullet, Y. (eds) European Data Protection: In Good Health?. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2903-2_1

Download citation

Publish with us

Policies and ethics