1 D O S S I E R l Lucía Tello Madrid (Spain) Received: / Received: Accepted: / Published: DOI: Intimacy and «Extimacy» in Social Net - works. Ethical Boundaries of Facebook Intimidad y «extimidad» en las redes sociales. Las demarcaciones éticas de Facebook ABSTRACT The current paper aims to analyze how certain Facebook settings, model of new Information and Communication Technologies (ICT), have turned into an infringement of some existing privacy Ethical principles. This totally changed and modern paradigm has its clearest expression in recent Web 2.0, and omnipotent Communication Technology, and implies the reconsideration of each Ethical Principles, especially those related to Intimacy and Image Protection. Our research explains not just how these areas are affected by technological changes but also the way these imperative ethical principles are violated because users ignorance and confidence. This carefree attitude and the increasing communicative relevance have given networking precedence over Intimacy protection. The result of this action has been denominated «Extimacy» according to the author Jacques Lacan, a concept which can be translated as public Intimacy through networking activities, namely, exposed Intimacy. The goal we aim to achieve is to illustrate the different ways our Privacy can be damaged by some Facebook measures (as Privacy Policies Change, collecting tendencies of consumption, the use of private data and revealing users confidence). Likewise these arguments will be endorsed by international researches focused on Facebook privacy violations, which we are going to expose to understand how citizens can carry out different actions to defend our Intimacy and Image Rights. RESUMEN El presente trabajo analiza cómo ciertas herramientas de Facebook, modelo de las nuevas tecnologías de la información, han derivado en la vulneración de algunos planteamientos éticos vigentes hasta el momento. Este paradigma comunicativo que encuentra su máxima expresión en las redes sociales y la tecnología 2.0, implica un replanteamiento de los principios de la ética informativa relativos a la salvaguarda de la intimidad, la protección de la vida privada y el resguardo de la propia imagen. Esta investigación estudia cómo estas áreas no solo se ven afectadas por los cambios tecnológicos y la propia naturaleza de la fuente informativa, sino por la confianza y desconocimiento de los usuarios, quienes dan primacía a la comunicación por encima de la intimidad. Este fenómeno denominado «extimidad» por Jacques Lacan, se traduce como la intimidad hecha pública a través de las nuevas redes de comunicación o intimidad expuesta. En nuestro análisis expondremos los resortes a través de los cuales se quebranta nuestra privacidad en Facebook, especialmente por medio de la captación de pautas de comportamiento, el empleo de datos derivados de los perfiles, los cambios en la política de privacidad y el reconocimiento facial, avalando su transgresión con documentación derivada de investigaciones realizadas por organismos internacionales. En resumen, analizar la vulneración de la intimidad en las redes sociales y entender qué medidas pueden implementarse para defender nuestros derechos son el objetivo de esta comunicación. KEYWORDS / PALABRAS CLAVE Internet, ethics, Facebook, intimacy, extimacy, social networking. Internet, ética, Facebook, intimidad, extimidad, vulneración, redes sociales. v Dr. Lucía Tello Díaz is Honorary Researcher in the Department of Journalism III of the School of Information Sciences at the Complutense University of Madrid (Spain) Comunicar, n. 41, v. XXI, 2013, Scientific Journal of Media Education; ISSN: ; pages
4 208 more and more prominent on the Web 2.0» (Ruiz & Masip, 2010: 9). In this context appears Facebook, the most prominent Social Network Site on the Internet. Although GeoCities or MySpace were consolidated sites, Facebook (created by Mark Zuckerberg in 2003) was implanted transforming the concept of interaction: «users create, share and consume information in a very different way than before» (Yuste, 2010: 86), and this situation has «created a favourable atmosphere for making intermediary disappear users have direct The current erosion of users privacy from numerous fronts is perturbing, the cause stems from three vast forces: the first one is the technology itself, which makes possible to be on anyone s track with instantaneous precision [ ] The second one is the pursuit of profits, which makes companies monitor consumer s tastes and habits in order to personalize advertising. At last we find Go vernments which collect many of these data in their own servers. access to information sources and for generating an abundant content of a diverse origin» (Yuste, 2010: 86). According to the report «Spanish Habits and Social Networking», Facebook has replaced the rest of Social Networks in our country (Libreros, 2011), being used by a 95 percent of users (followed by You - Tube, Tuenti and Twitter), who utilize it for sending private messages (60%) and public messages (50%), for sharing and uploading pictures (37%), for updating their profile (32%) and becoming a fan or to follow commercial trademarks (26%) (Libreros, 2011). These particular five activities will be relevant in order to categorize users, to discover tendencies and to establish parameters of their profiles Infringement of the right to privacy and data protection To be connected to the Internet and to have a power source are the two required elements for accessing our personal information from all over the world. New communication technologies offer an un - controllable data reproducibility and they allow accessing this extremely up-to-date information not just for consulting it, but also for using it: The current erosion of users privacy from numerous fronts is perturbing, the cause stems from three vast forces: the first one is the technology itself, which makes possible to be on anyone s track with instantaneous precision [ ] The second one is the pursuit of profits, which makes companies monitor consumer s tastes and habits in order to personalize advertising. At last we find Go vernments which collect many of these data in their own servers (Garton, 2010). When a user indicates a preference, declares her/his interest to an advertisement or chooses an airline, she/he leaves «traces» which illustrates inclinations and consumption habits. What used to be personal becomes now collective: «the massification on Social Net working Sites has generalized a concept denominated «ext imacy», something like re - vealing intimacy with its roots in the rise of Reality Shows and the Web 2.0» (Pérez-Lanzac & Rincón, 2009). If we assume that intimacy means personal information which should not be revealed (Kieran, 1998: 83), or information that «we seriously and legitimately protect from being published» (Olen, 1988: 61), the fact that our presence on the Internet could be tracked, implies an infringement of our civil rights: To renounce intimacy in our online purchases may seem to be mild. To renounce intimacy buying flights may seem reasonable; even a closed television circuit can give the impression of not to be problematic. Nonetheless, when all of them are added up we find that we do not have intimacy at all (Johnson, 2010: 193). 4. Forms of privacy infringement on Facebook Many aspects of privacy and intimacy are unprotected in Social Network Sites, especially on Face - book, the platform with more access to the users personal data. Facebook collects this information through different settings, particularly data derived from profiles and the famous «Like» button: Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexual orientation, ethnicity, reli-
8 212 a curb on citizen s privacy invasion; to regulate and to control meddling companies [ ] The same technologies which reduce our right to privacy can also help us defend ourselves (Garton, 2010). At present, until a unitary regulation will be established, we should demand users to protect their own rights, although it implies to decide on what terms they use Social Networking Sites and in which way they share their personal data. References ACEBEDO, R. (2011). La historia de Facebook desde adentro. La Ter cera, (www.latercera.com/noticia/ten dencias/20-11/01/ la-historia-de-facebook-desde-adentro.shtml) ( ). BILTON, N. (2010). Price of Facebook Privacy? Start Clicking. The New York Times, (www.nytimes.com/2010/05/ 13/ - tech nology/personaltech/13basics.html?_r=0) ( ). BOUTIN, P. (2010). 3 Essential Stops to Facebook Privacy. The New York Times, (http//gadget wise.blogs.ny times. com/ /06/21/3-essential-steps-to-facebook-privacy) ( ). BOYD, D. & ELLISON, N. (2007). Social Network Sites: Definition, History and Scholarship. Journal of Computer-Mediated Com mu - nication 13, (DOI: /j x) ( ). DEBATIN, B. LOVEJOY, J.P. HORN, A.K. HUGHES, B.N. (2009). Fa ce - book and Online Privacy: Attitudes, Behaviors, and Unintended Con - sequences. Journal of Computer-Mediated Communication. 15, 1, (DOI: /j x). ( ). EHRLICH, P. & EHRLICH, A. (2013). Can a Collapse of Global Ci vi - li zation be Avoided? Proceedings of The Royal Society B. 280: Royal Society Publishing. Biological Sciences. (http:// dx. - doi.org/ /rspb ) ( ). EL ECONOMISTA ( ). La historia oculta de Facebook. (www.eleconomista.es/interstitial/volver/acierto/telecomunicaciones- tecnologia/noticias/ /05/10/la-historia-oculta-de-facebook- La-gente-confia-en-mi-son-tontos-del-culo.html) ( ). ELLISON, N., STEINFIELD, L. & CLIFF, C. (2007). The Benefits of Fa cebook «Friends»: Social Capital and College Students Use of On line Social Network Sites. Journal of Computer-Mediated Co - m mu nication, 12, (DOI: /j x) ( ). EL MUNDO (Ed.) (2012). Facebook y Linkedin se comprometen a re forzar su privacidad. El Mundo, 29/06/2012. (www.elmun do. es/ - elmundo/2012/06/29/navegante/ html) ( ). EL PAÍS (Ed.) (2009). Más intimidad en Facebook. El País, (http//tecnologia.elpais.com/tecnologia/2009/08/27/actualidad/ _ html) ( ). FACEBOOK (Ed.) (2012). Facebook s Data Pool. Europe vs Face - book (http//europe-v-facebook.org/ EN/Data_ Pool/ - da ta _ pool.html) ( ). FAIR, L. (2011). The FTC s settlement with Facebook. Where Fa - ce book went wrong. Federal Trade Commission Protecting Ame - rica s Consumers (http//business.ftc.gov/blog/ 2011/ - 11/ ftc%e2%80%99s-settlement-facebook-where-facebook-wentwrong) ( ). FEDERAL TRADE COMMISSION (Ed.) (2011).Facebook settles FTC Charges that it Deceived Consumers by Failing to Keep Privacy Promises. Federal Trade Commission Protecting America s Con - sumers, (http//ftc.gov/opa/2011/11/privacysettlement. - shtm) ( ). GARTON, T. (2010). Facebook: restablecer la privacidad. El País, (http//elpais.com/diario/2010/10/11/ opinion/ _ html) ( ). GONZÁLEZ-GAITANO, N. (1990). El deber de respeto a la intimidad. Información pública y relación social. Pamplona: EUNSA. HORVÁT E.A., HANSELMANN M. & AL. (2012). One Plus One Ma - kes Three (for Social Networks). PLoS ONE 7(4), e (DOI: /journal.pone ) ( ). JOHNSON, D.G. (2010). Ética informática y ética e Internet. Ma - drid: Edibesa. JONES, J.J., SETTLE, J.E., BOND R.M. & AL. (2013). Inferring Tie Strength from Online Directed Behaviour. PLoS ONE 8(1), e (DOI: /journal.pone ) ( ). KANAI, R., BAHRAMI, B., ROYLANCE, R. & AL. (2012): Online Social Network Size is Reflected in Human Brain Structure. Proceedings of The Royal Society B. 280: Royal Society Publishing. Bio logical Sciences, (DOI: /rspb ) ( ). KIERAN, M. (Ed.). (1998). Media Ethics. London: Routledge. KING, B. (2007). Facebook Data Protection Row. Channel 4, (www.channel4.com) ( ). KOSINSKIA M., STILLWELLA, D. & GRAEPELB, T. (2013). Private Traits and Attributes are Predictable from Digital Records of Hu - man Behaviour. Proceedings of the National Academy of Sciences (PNAS). University of California, Berkeley. (DOI: / pnas ) ( ). LACALLE, C. (2011). La ficción interactiva. Televisión y Web 2.0. Ámbitos, 20. LIBREROS, E. (2011). Las redes sociales en España IEDGE, (http//blog.iedge.eu/direccion-marketing/marketinginteractivo/social-media-marketing/eduardo-liberos-las-redes-sociales-en-espana-2011) ( ). LÓPEZ-REYES, Ó. (1995). La ética en el periodismo. Los cinco factores que interactúan en la deontología profesional. República Do - mi nicana: Banco Central. MARSHALL, T. (2012): Facebook Surveillance of Former Romantic Partners: Associations with PostBreakup Recovery and Personal Growth. Cyberpsychology, Behavior and Social Networking, 15, 10 (DOI: /cyber ) ( ). MORSE, G. & WATTS, D. (2003). The Science behind Six Degrees. Harvard Business Review Online, Febrero. (http//hbsp.harvard.- edu/ b02/en/hbr/hbrsa/current/0302/article) ( ). OLEN, J. (1988). Ethics in Journalism. Englewood Cliffs. New Jersey: Prentice Hall. O BRIEN, K. (2012). Germans Reopen Investigation on Facebook Privacy. The New York Times, (www.nytimes.com/ 20-12/08/16/technology/germans-reopen-facebook-privacy-in qu iry. - html) ( ). O REILLY, T. (2007). What is the Web 2.0. Design Patterns and Business Models for the Next Generation of Software. Munich Personal RePEc Archive (MPRA), 4.580, (http// m - pra. ub.uni-muenchen.de/4580) ( ). PÉREZ-LANZAC, C. & RINCÓN, R. (2009). Tu «extimidad» contra mi intimidad. El País, (www.elpais.com) ( ). REPORT OF DATA PROTECTION AUDIT OF FACEBOOK IRELAND PUBLISHED (2012). Oficina del Comisionado de Pro tección de Da - tos de Irlanda (www.dataprotection.ie/viewdoc. asp?docid= 1175) ( ). ROMERO-COLOMA, A.M. (1987). Derecho a la intimidad, a la in - for mación y proceso penal. Madrid: Colex. ROMERO, P. (2012). A las redes sociales les cuesta «olvidar. El
9 213 Mundo, (www.elmundo.es/elmundo/2012 /02/20/ na - vegante/ html) ( ). RUIZ, C., MASIP, P., MICÓ, JL. & AL. (2010). Conversación 2.0 y de mocracia. Análisis de los comentarios de los lectores en la prensa. Comunicación y Sociedad, XXIII, 2. VARIOS (Ed.). Declaración de licencia y términos de uso del sitio web de Facebook. (www.facebook.com/legal/terms) ( ). VARIOS (2007). Psicología social. Madrid: McGraw Hill. WARREN, S. & BRANDEIS, L. (1890). El derecho a la intimidad. Madrid: Civitas. WATTS, D.J. (2004). Six Degrees. The Science of a Connected Age. (Primera edición de 1971). New York: W.W. Norton & Com pany. YUSTE, B. (2010). Twitter, el nuevo aliado del periodista. Cua der - nos de Periodistas, diciembre, 86. Madrid: Asociación de la Prensa de Madrid. ZAINAB, A. & MAMUNA, K. (2012). Users Perceptions on Face - book s Privacy Policies. ARPN Journal of Systems and Software, 2, 3. (http//scientific-journals.org) (DOI /j x).
The British Academy of Management s Website and Social Media Policy The creation of management knowledge through research and its dissemination through teaching and application The British Academy of Management
UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your
Social Media Policy April 2013 DRAFT Social Media Policy Page 1 of P a g e Policy Title Policy Reference Number Social Media Policy Corp13/002 Implementation Date April 2013 Review Date April 2015 Responsible
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
T E R M S A N D C O N D I T I O N S FO R PR O M O R E PU B L I C SE R VI C E Last review 8 May 2015 PromoRepublic offers the services defined below pursuant to the terms and conditions presented in the
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
cosmeticsurgerycounselling.com is owned and operated by Cosmeticsupport.com, operating as a private agency. This information archive and support site is therefore governed under the laws of UK, the EU.!
This policy approved by Council as an amendment to the City of Kalispell Personnel Handbook on April 20, 2015 (Resolution 5716). Purpose The purpose of this policy is to guide city employees in the proper,
Lobbying: Sweet Smell of Success? A case study on the transparency of lobbying around sugar regulation in the European Union and Spain 1. Introduction It is essential that government decision making be
ARTICLE 29 DATA PROTECTION WORKING PARTY 1676/13/EN WP 208 Working Document 02/2013 providing guidance on obtaining consent for cookies Adopted on 2 October 2013 This Working Party was set up under Article
Online and Mobile Privacy Notice ( Privacy Notice ) Introduction This Privacy Notice applies to the operations of Cigna Global Health Benefits and its affiliated companies listed at the end of this Privacy
Today, our personal information is being collected, shared, stored and analysed everywhere. Whether you are browsing the internet, talking to a friend or making an online purchase, personal data collection
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Youngevity Essential Life Sciences & Youngevity International, Inc. Guidelines for Distributor created and maintained websites The following excerpts from Youngevity s Policies and Procedures are compiled
THE UNIVERSITY OF PUERTO RICO S INSTITUTIONAL POLICY AND PROCEDURE FOR THE LEGAL ETHICAL USE OF INFORMATION TECHNOLOGY Approved by the Board of Trustees, Certification No. 72 () I. INTRODUCTION Institutions
Social Media Platform Agreements and Brand Risk BRUCE GOLDNER AND NAOMI SOSNER, SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP, WITH PRACTICAL LAW INTELLECTUAL PROPERTY & TECHNOLOGY This Article summarizes key
Iowa County Government Social Media Use Policy This policy outlines appropriate use of social media, as it relates to Iowa County, by employees and departments for official and personal use. This policy
Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data David Haynes, City University, School of Informatics, Department of Information Science August 2011 Background Two surveys
General Terms and Conditions GTC OnlineFootballManager ( OFM ) is an offer by OnlineFussballManager GmbH, Eupener Str. 60, D-50933 Cologne (referred to as OFM GmbH below), consisting of a browser-based
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
Your Privacy Center Your privacy is our priority. At Discover, our actions and decisions are guided by our mission to help people achieve a brighter financial future. And when it comes to your privacy,
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Big Data Big Privacy Privacy Awareness Week SPEAKING NOTES Stephen Wilson Lockstep Group Setting the scene Practical experience shows a gap in the understanding that technologists as a class have regarding
& Reference Check: Is Your Boss Watching? Privacy and Your Facebook Profile www.ipc.on.ca Reference Check: Is Your Boss Watching? Privacy and Your Facebook Profile Facebook and other online social networks
AUSTRALIA S NEW PRIVACY LAWS - WHAT LAWYERS NEED TO KNOW ABOUT THEIR OWN PRACTICES http://www.lawcouncil.asn.au The Privacy Commissioner has welcomed the Law Council s initiative in producing this overview.
SPEECH/10/279 Neelie Kroes European Commissioner for Digital agenda Bringing European values to the Internet of Things 2 nd Annual Internet of Things Conference Brussels, 1 st June 2010 Ladies and gentlemen,
North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for Social Media Usage in North Carolina December
Social Media Policy Last Updated January 2014 Purpose Social media offers the opportunity for people to gather in online communities of shared interest and create, share or consume content. As a member-based
What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online
Policies on Website, Digital Content and Social Media Introductory Statement: Stanford Children s Health and Lucile Packard Children s Hospital Stanford utilize our digital and social presence to propel
Information Governance (IG) encompasses sets of multi disciplinary structures, policies, procedures, processes and controls implemented to manage records and information at an enterprise level, supporting
la Caixa predoctoral contracts at UIB Obra Social La Caixa, with the firm willingness to contribute to the enhancement of the human potential existing in his area of activity, and fully aware of the great
Website Terms and Conditions In these terms and conditions, "we", "us" and "our" means Southern Cross Austereo Pty Limited ACN 109 243 110 and its related bodies corporate and any successors or assigns..
a b The way we do business. Our Code of Conduct and Ethics. Our Code of Conduct and Ethics In this Code, the Board of Directors and the Group Executive Board set out the principles and practices that define
I. Applicability 1. GamesInFlames UG (referred to hereinafter as GIF ) offers the online game Aloha Paradise Hotel as well as other content and services (also referred to collectively hereinafter as Services
RBC STUDENTS CLICK TO GET MORE RETWEET CONTEST THIS CONTEST IS OPEN TO CANADIAN RESIDENTS ONLY AND IS GOVERNED BY CANADIAN LAW. The RBC Students Click to Get More Retweet Contest (the Contest ) is in no
A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries Questions marked with an asterisk * require an answer to be given.
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
Freedom of Information Act 2000 (FOIA) Decision notice Date: 18 January 2016 Public Authority: Address: Gambling Commission Victoria Square House Victoria Square Birmingham B2 4BP Decision (including any
You can find the latest version of this guidance on our website at www.gmc-uk.org/guidance. Published 25 March 2013 Comes into effect 22 April 2013 Personal beliefs and medical practice 1 In Good medical
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Indicators of teaching and learning science through inquiry in primary classroom Wynne Harlen UK Overview of workshop Part 1: Why IBSE? What do we want to achieve through it? Part 2: Thinking about how
Your consent to our cookies if you continue to use this website.