We Are All Connected to Facebook … by Facebook!

  • Arnold RoosendaalEmail author


Numerous websites have implemented the Facebook “Like” button to let Facebook members share their interests, thus promoting websites or news items. It is, thus, an important business tool for content providers. However, the tool is also used to place cookies on the user’s computer, regardless of whether a user actually uses the button when visiting a website. This allows Facebook to track and trace users and to process their data. It appears that non-Facebook members can also be traced via the Like button. This means that Facebook’s data collection practices reach far beyond their own platform and membership. Owing to the proliferation of Like buttons, Facebook has a potential connection with all web users. Web activity can be linked to individual accounts, or a separate data set can be created for individuals who are not (yet) Facebook members. The hidden collection of data on browsing behavior and the creation of individual data sets has ramifications for the privacy of individuals. Privacy issues arising from thirdparty cookie use and connectivity of web activity and devices will be discussed, using the technical process behind the Facebook Like button as an example.


Personal Data Social Network Site Content Provider Identity Construction Contextual Integrity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Agre, Philip E., and Marc Rotenberg. 1997. Technology and privacy: The new landscape. Cambridge: MIT Press.Google Scholar
  2. Berlin, Isaiah. 1958. Two concepts of liberty. Oxford: Clarendon Press.Google Scholar
  3. boyd, danah. 2008. Why youth heart social network sites: The role of networked publics in teenage social life. In Youth, identity, and digital media, ed. David Buckingham, 119–142. Cambridge: MIT Press.Google Scholar
  4. boyd, danah, and Eszter Hargittai. 2010. Facebook privacy settings: Who cares? First Monday 15:8.Google Scholar
  5. Burbary, Ken. 2009. Five reasons companies should be integrating social media with Facebook connect. Accessed 20 Aug 2009.Google Scholar
  6. Dwyer, Catherine A. 2009. Behavioral targeting: A case study of consumer tracking on Levis.Com. Paper presented at the 15th American Conference on Information Systems, San Francisco, California.Google Scholar
  7. Goffman, Erving. 1959. The presentation of self in everyday life. Garden City: Doubleday & Company.Google Scholar
  8. Hekman, Susan J. 2004. Private selves, public identities: Reconsidering identity politics. University Park: The Pennsylvania State Univ. Press.Google Scholar
  9. Kirk, J. 2010. NHS link to Facebook raises privacy concerns. Accessed 7 Dec 2011.Google Scholar
  10. Lloyd, Ian J. 2008. Information technology law. Oxford: Oxford Univ. Press.Google Scholar
  11. Martin, David, Hailin Wu, and Adil Alsaid. 2003. Hidden surveillance by web sites: Web bugs in contemporary use. Communications of the ACM 46 (12): 258–264.CrossRefGoogle Scholar
  12. Nissenbaum, Helen. 2004. Privacy as contextual integrity. Washington Law Review 79: 119–158.Google Scholar
  13. Parent, William A. 1983. Privacy, morality, and the law. Philosophy and Public Affairs 12 (4): 269–288.Google Scholar
  14. Roosendaal, Arnold. 2010. Facebook tracks and traces everyone: Like this! Tilburg Law School Research Paper No. 03/2011. Accessed 30 Nov 2010.Google Scholar
  15. Rouvroy, Antoinette, and Yves Poullet. 2009. The right to informational self-determination and the value of self-development: Reassessing the importance of privacy for democracy. In Reinventing Data Protection, ed. Serge Gutwirth et al. 45–76. Berlin: Springer.Google Scholar
  16. Schwartz, Paul M. 1999. Privacy and democracy in cyberspace. Vanderbilt Law Review 52: 1609–1701.Google Scholar
  17. Solove, Daniel J. 2002. Conceptualizing privacy. California Law Review 90 (4): 1087–1156.CrossRefGoogle Scholar
  18. Solove, Daniel J. 2006. A taxonomy of privacy. University of Pennsylvania Law Review 154 (3): 477–560.CrossRefGoogle Scholar
  19. Solove, Daniel J. 2008. Understanding privacy. Cambridge/London: Harvard Univ. Press.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2012

Authors and Affiliations

  1. 1.Tilburg Institute for Law, Technology, and Society (TILT)Tilburg UniversityTilburgThe Netherlands

Personalised recommendations