2. What is Facebook?
People can:People can:
Add friendsAdd friends
Share photos & status updatesShare photos & status updates
Play games onlinePlay games online
Join groupsJoin groups
Collaborate in other ways…Collaborate in other ways…
(Facebook, 2010)
3. Create an accountCreate an account
You're over 18 years
Between 13-18 (parents
supervision)
You can join if:You can join if:
You're under 13 years
You're a convicted sex offender
You can't join if:You can't join if:
So, what's the catch?So, what's the catch?
You have to accept
Facebook's Terms of
Service (Facebook,
2010)
How do you join?How do you join?
4. What does that mean?What does that mean?
In a nutshell:In a nutshell:
Less privacy
(Privacy and the Internet, 2008)
Targeted advertising
Digital history
5. Its all fun and games...Its all fun and games...
Until someone gets hurtUntil someone gets hurt
Harassment
Bullying
Stolen identities
DELETED!!!!DELETED!!!!
But I'm innocent! I swear!But I'm innocent! I swear!
Too late
Oh, and your data is mine
You should review our Terms of
Service for the reasons why...
7. Read the terms and
you'll learn...
Facebook owns your:Facebook owns your:
Photos, posts, friends and their feeds
Facebook sells you:Facebook sells you:
With your implied consent
Using targeted ads
8. Termination
What you can't do
Copyright
Ownership
3rd
parties
Privacy
Reading the terms only takesReading the terms only takes
you so far...you so far...
Read & learn
about your online
privacy
(Goettke & Christiana,
2007)
Check that your
privacy settings
are high
(Introna, 1997)
Poster beware:
It all belongs to
you
9. Too important to miss:Too important to miss:
Free, is not really free. The price is your privacy in
this online life. (Lyon, 2002)
10. ReferencesReferences
(1998) Summary of the Digital Millennium Copyright Act. The UCLA Online Institute for Cyberspace Law and
Policy. Retrieved from: http://gseis.ucla.edu/iclp/dmca1.htm
(2006). Six Tips to Protect Your S earch Privacy. Retrieved from:
http://www.eff.org/wp/six-tips-protect -your-search-privacy
(2008). Privacy a nd the Internet: Trave lling in Cyberspace S afely. Re trieved from:
http://www.privac yrights .org/fs/fs1 8-cyb.htm
Barlow, J. P. (1996). A Dec laration of the Indep enden ce of Cybe rsp ace . Re trieved from:
https://projects .eff.org/~bar low/Declaration-Final.html
Bowrey, K. & Rimmer, M. (2002), Rip, Mix, Burn: The Politics of Peer to Pe er and Copyright Law in First
Monday, 7(8). Retrieved from: http://firstmonday.org/htbin/cgiwrap /bin/ojs/index.php/fm/article/vie w/974/895
Fa cebook.com (2010). Facebook: Term s of S ervice. Retrieved from http://www.faceb ook.com/terms.php?ref=pf
Goe ttke, R., & Christiana, J. (2007). Privacy an d Online S ocial Net working Website s. Computer Sc ien ce 199r:
Special Topics in Compu ter Sc ien ce Computation and Socie ty: Privac y and Tech nology. Retrieved from:
http://www.ee cs.harvard.edu/cs 199r/fp/RichJ oe.pdf
Harris, L. (2009). Advanc ing Global Internet Freedom . Retrieved from:
http://blogs.reuters.com/great-debate/2009/03/03/advancing-global-internet-freed om/
11. ReferencesReferences
Introna, L. D. (1997). Privacy and the computer: why we need privacy in the information society.
Metaphilosophy, 28(3), 259-275. Retrieved from the Curtin Library Database
Johnson, D., & Post, D. (1996). Law And Borders: The Rise of Law in Cyberspace. Stanford Law Review, 1367.
Retrieved from: http://cyber.law.harvard.edu/is02/readings/johnson-post.html
Lessig, L. (1998). The Architecture of Privacy. Retrieved from:
http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf
Lessig, L. (1998). The Laws of Cyberspace. http://www.lessig.org/content/articles/works/laws_cyberspace.pdf
Lyon, D. (2002). “Everyday Surveillance: Personal Data and Social Classification,” Information, Communication,
and Society, 5(1). Retrieved from: http://pacific.commerce.ubc.ca/kbe/lyon_surveillance.pdf
Myers, K. (2006). Wikimmunity: Fitting the Communications Decency Act to Wikipedia. Harvard Journal of Law &
Technology, 163. Retrieved from: http://ssrn.com/abstract=916529
O'Sullivan, M. (2008). Creative Commons and contemporary copyright: A fitting shoe or “a load of old cobblers”?
in First Monday, 13(1). Retrieved from:
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2087/1919
Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of
borders in cyberspace. First Monday, 11(1). Retrieved from:
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307/1227