Ethics and Information Technology

, Volume 13, Issue 4, pp 289–302 | Cite as

Contextual gaps: privacy issues on Facebook

  • Gordon Hull
  • Heather Richter Lipford
  • Celine Latulipe
Original Paper

Abstract

Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many of the sites’ privacy issues. Applications, which nearly invisibly shares not just a users’, but a user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship” online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an interface that made the flows of information more transparent to users.

Keywords

Internet Privacy Contextual integrity Social networking Facebook 

References

  1. Alexa. (2010). Facebook.com—site info from Alexa. March, at: http://www.alexa.com/siteinfo/facebook.com.
  2. Bailey, J. (2009). Life in the fishbowl: Feminist interrogations of webcamming. In Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford: OUP, pp. 283–301.Google Scholar
  3. Benkler, Y. (2003). Through the looking glass: Alice and the constitutional foundations of the public domain. Law and Contemporary Problems, 66, 173–224.Google Scholar
  4. Benkler, Y. (2006). The wealth of networks: How social production transforms markets and freedom. New Haven: Yale UP.Google Scholar
  5. Besmer, A., & Lipford, H. R. (2010). Users’ (Mis)conceptions of social applications. To appear, Proceedings of Graphics Interface.Google Scholar
  6. Binder, J., Howes, A., & Sutcliffe, A. (2009). The problem of conflicting social spheres: Effects of network structure on experienced tension in social network sites. Proceedings of CHI 2009, Boston: ACM Press, pp. 965–974.Google Scholar
  7. boyd, d. (2006). Friends, Friendsters, and MySpace Top 8: Writing Community Into Being on Social Network Sites. First Monday 11:12, December. http://www.firstmonday.org/issues/issue11_12/boyd/index.html.
  8. boyd, d. (2007). Why youth (heart) social network sites: The role of networked publics in teenage social life. In D. Buckingham (Ed.) MacArthur foundation series on digital learningyouth, identity, and digital media volume. Cambridge, MA: MIT Press, pp. 119–142.Google Scholar
  9. boyd, d. (2008). Facebook’s privacy trainwreck: Exposure, invasion and social convergence. Convergence, 14(1), 13–20.CrossRefGoogle Scholar
  10. Brey, P. (2000). Disclosive computer ethics. Computers and Society (Dec.), pp. 10–16.Google Scholar
  11. Christofides, E., Muise, A., & Desmarais, S. (2009). Information disclosure and control and facebook: Are they two sides of the same coin or two different processes? Cyberpsychology and Behavior, 12(30), 341–345.CrossRefGoogle Scholar
  12. Clark, A. (2003). Natural-Born cyborgs: Minds, technologies, and the future of human intelligence. Oxford: OUP.Google Scholar
  13. Cocking, D. (2008). Plural selves and relational identity. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 123–141). Cambridge: CUP.Google Scholar
  14. Cutler, J. (2004). Senator sacked me over tales of congress, The Guardian (UK), June 2, 2004, at http://www.guardian.co.uk/world/2004/jun/02/usa. Accessed 5/09.
  15. DiMicco, J., et al. (2008). Motivations for social networking at work. In Proceedings of CSCW’08. San Diego: ACM Press, pp 711–720.Google Scholar
  16. DiMicco, J. M. & Millen, D. R. (2007). Identity management: Multiple presentations of self in facebook identity. In Proceedings of GROUP’07. Florida: ACM Press, pp. 383–386.Google Scholar
  17. Dwyer, C., & Hiltz, S. R. (2008). Designing privacy into online communities. In Proceedings of Internet Research 9.0, October 2008.Google Scholar
  18. Ellison, N., Steinfeld, C., & Lampe, C. (2007). The benefits of Facebook ‘Friends:’ Social capital and college students’ use of online social network sites. Journal of Computer Mediated Communication, 12(4), article 1, http://jcmc.indiana.edu/vol12/issue4/ellison.html.
  19. Felt, A., & Evans, D. (2008). Privacy protection for social networking APIs. In Proceedings of Web 2.0 Security and Privacy 2008.Google Scholar
  20. Fleckenstein, K. S. (2008). Cybernetics, ethos, and ethics. In L. Worsham & G. A. Olson (Eds.), Plugged in: Technology, rhetoric and culture in a posthuman age (pp. 3–23). Cresskill, NJ: Hampton Press.Google Scholar
  21. Gelman, L. (2009). Privacy, free speech, and ‘blurry-edged’ social networks. Boston College Law Review, 50, 1315–1344.Google Scholar
  22. Good, N. S., Grossklags, J., Mulligan, D. K., & Konstan, J. A. (2007). Noticing notice: A large-scale experiment on the timing of software license agreements. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. San Jose: ACM Press, pp. 607–616.Google Scholar
  23. Grimmelman, J. (2010). Privacy as Product Safety. Widener Law Journal (forthcoming), available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1560243.
  24. Grimmelman, J. (2009). Saving Facebook. Iowa Law Review, 94, 1137–1206.Google Scholar
  25. Gross, R., & Acquisiti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of WPES’05. Alexandria, VA: ACM Press, pp. 71–80.Google Scholar
  26. Hashemi, Y. (2009) Facebook’s privacy policy and its third-party partnerships: Lucrativity and liability. Boston University Journal of Science and Technology Law, 15, 140–161.Google Scholar
  27. Hull, G. (2009). Overblocking autonomy: The case of mandatory library filtering software. Continental Philosophy Review, 42, 81–100.CrossRefGoogle Scholar
  28. Introna, L. D., & Nissenbaum, H. (2000). Shaping the web: Why the politics of search engines matters. The Information Society, 16(3), 169–185.Google Scholar
  29. Jimroglou, K. M. (1999). A camera with a view: JenniCAM, visual representation, and cyborg subjectivity. Information, Communication & Society, 2(4), 439–453.Google Scholar
  30. Joinson, A. N. (2008). ‘Looking at,’ ‘Looking up,’ or ‘Keeping up with’ People? Motives and uses of Facebook. In CHI 2008 Proceedings: Online Social Networks. pp. 1027–1036.Google Scholar
  31. Jones, H., & Soltren, J. H. (2005). Facebook: Threats to privacy, available at: http://groups.csail.mit.edu/mac/classes/6.805/student-papers/fall05-papers/facebook.pdf. Accessed 5/09.
  32. Lampe, C., Ellison, N. B., & Steinfield, C. (2006). A Face(book) in the crowd: Social searching vs. social browsing. Proceedings of CSCW’06. Alberta: ACM Press, pp. 167–170.Google Scholar
  33. Lampe, C., Ellison, N. B., & Steinfield, C. (2007). A familiar Face(book): Profile elements as signals in an online social network. In Proceedings of CHI’07. San Jose: ACM Press, pp. 435–444.Google Scholar
  34. Lampe, C., Ellison, N. B., & Steinfield, C. (2008). Changes in use and perception of Facebook. In CSCW’08. San Diego: ACM Press, pp. 721–730.Google Scholar
  35. Latour, B. (1992). Where are the missing masses? The sociology of a few mundane objects. In W. E. Bijker & J. Law (Eds.), Shaping technology/building society (pp. 225–258). Cambridge, MA: MIT Press.Google Scholar
  36. Lessig, L. (2006). Code and other laws of cyberspace, Version 2.0. New York: Basic Books.Google Scholar
  37. Lipford, H. R., Hull, G., Latulipe, C., Besmer, A., & Watson, J. (2009). Visual flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Proceedings of the Workshop on Security and Privacy in Online Social Networking, IEEE International Conference on Social Computing (SocialCom), August 2009.Google Scholar
  38. Livingstone, S. (2008). Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy, and self-expression. New Media Society, 10, 393–411.CrossRefGoogle Scholar
  39. MacKenzie, A. (2006). Cutting code: Software and sociality. New York: Peter Lang.Google Scholar
  40. Matthews, S. (2008). Identity and Information Technology. In J. van den Hoven & J. Weckert (Eds.) Information technology and moral philosophy. Cambridge: CUP, pp. 142–160.Google Scholar
  41. Myskja, B. K. (2008). The categorical imperative and the ethics of trust. Ethics and Information Technology, 10, 213–220.CrossRefGoogle Scholar
  42. Nielsen, W. (2009). Time spent on Facebook up 700%, but MySpace Still Tops for Video, at http://blog.nielsen.com/nielsenwire/online_mobile/time-spent-on-facebook-up-700-but-myspace-still-tops-for-video/. Accessed 6/09.
  43. Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 101–139.Google Scholar
  44. Office of the Privacy Commissioner of Canada. (2009). Facebook agrees to address Privacy Commissioner’s concerns, August 27, 2009. at http://www.priv.gc.ca/media/nr-c/2009/nr-c_090827_e.cfm. Accessed 11/09.
  45. Papacharissi, Z. (2009). The virtual geographies of social networks: A comparative analysis of Facebook, LinkedIn and ASmallWorld. New Media Society, 11, 199–220.CrossRefGoogle Scholar
  46. Solove, D. J. (2007a). The future of reputation: Gossip, rumor and privacy on the internet. New Haven, CT: Yale UP.Google Scholar
  47. Solove, D. J. (2007b). ‘I’ve Got Nothing to Hide’ and other misunderstandings of privacy. San Diego Law Review, 44, 745–772.Google Scholar
  48. Strater, K., & Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. In Proceedings of the 22nd British HCI Group 2008. Liverpool UK: ACM Press, pp. 111–119.Google Scholar
  49. Sunstein, C. R., & Ullmann-Margalit, E. (1999). Second-order decisions. Ethics, 110, 5–31.CrossRefGoogle Scholar
  50. Technorati. (2008). State of the blogosphere, at http://technorati.com/blogging/state-of-the-blogosphere/. Accessed 5/09.
  51. Terranova, T. (2004). Newtork culture: Politics for the information age. London: Pluto Press.Google Scholar
  52. Wesch, M. YouTube and you: Experiences of self-awareness in the context collapse of the recording webcam. ms. on file with authors (Forthcoming).Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  • Gordon Hull
    • 1
  • Heather Richter Lipford
    • 2
  • Celine Latulipe
    • 2
  1. 1.Department of PhilosophyUniversity of North Carolina CharlotteCharlotteUSA
  2. 2.Department of Software Information SystemsUniversity of North Carolina CharlotteCharlotteUSA

Personalised recommendations