< Back to Main Site

EDUCAUSE review onlineEDUCAUSE review online

Facebook 2.0

0 Comments

Viewpoints

© 2008 Tracy Mitrano

EDUCAUSE Review, vol. 43, no. 2 (March/April 2008)

Facebook 2.0

Tracy Mitrano

Tracy Mitrano is the Director of Information Technology Policy and Computer Policy and Law Programs at Cornell University. Comments on this article can be sent to the author at tbm3@cornell.edu and/or can be posted to the web via the link at the bottom of this page.

In March 2006, the Cornell University associate registrar called me and asked, “What are you going to do about Facebook?” I laughed, somewhat impolitely, at the thought that I could do anything at all about a dot-com, but later I came to understand what she wanted. Tales of embarrassing exposure, both for students and for higher education institutions, were causing genuine concern among administrators, who wanted to inform students of the pitfalls that they might experience in using this new, explosive Internet application. A few weeks later, on a typically dreary, rainy Saturday in central New York, I wrote “Thoughts on Facebook.”1

Fast-forward to early 2008: the press is filled with articles about social networking in general and Facebook in particular. Facebook owners have agreed to a multi-million-dollar Microsoft deal that implicitly values the site at $15 billion. MySpace, currently the largest site of its kind, is working with Google to create an open-source alternative as a means of fending off its ambitious competitor. The goal, in keeping with Google’s overall mission to organize the world’s knowledge, is to provide links between and among all of these sites in a seamless web of social networking connectivity. With Facebook recently allowing web crawlers like Google to capture front-pages of users’ profiles on a default open setting, this development is as predictable as it is inevitable: social networking goes global. Beacon—Facebook’s new advertising program, which uses its “News Feed” feature to share members’ activities on third-party sites—went from an opt-out to an opt-in program within a matter of days due to a user uprising over privacy. If nothing else, these reactions by users should end the notions, first, that there is no privacy on the Internet and, second, that youth have no interest in it. What remains fascinating is our ability to observe the re-creation of cultural norms whose existence in the physical world is largely assumed, repressed, or forgotten.

What challenges remain with this killer app? I suggest three: (1) user education, especially for adolescents and their parents; (2) new features connecting higher education’s missions to the popular site; and (3) legal and policy considerations on a global scale. Sensationalized and sad stories of teen-age suicides precipitated by cruel exchanges on social networking sites have raised the profile of information literacy and user education at early ages. Primary school is not too early, for both students and parents. For teen-agers, the emergence of “helicopter” parents has no doubt driven adolescents deeper into technological zones that are generally out of their parents’ hovering view. Unless an individual is particularly at risk, invading a teen-ager’s space is not the solution. But learning more about those spaces—how they operate, who is on them, and most important, how to talk about their social dynamics—is recommended. Parents can do that effectively only if they educate themselves about both the technology and the sociology of the Internet. And demonizing the technology, as is suggested even by such august public organs as Frontline, with its feature “Growing Up Online,” helps no one—not the youth who will undoubtedly use the technology, not their parents who supervise them, and not their teachers who need to understand the role that this technology plays in their development.

On this subject I have an illustrative, if not humbling, story. At the EDUCAUSE Learning Institute (ELI) annual meeting in January 2007, I invited a student of mine at Cornell to present a learning session about Facebook. With much poise, Nikki projected her Facebook front-page on the screen as attendees filled the room. I noted, with some curiosity, that Nikki’s profile photograph was of her in an elegant evening gown standing closely beside another young woman, similarly attired. Both, holding Champagne flutes, were smiling and happy in a toast. Facebook front-pages include a photograph and fields to be completed by the user. One of these fields is “relationship,” which Nikki had filled in with “Engaged to S.L.,” apparently the name of the other woman in the photograph (the full name was in the text, but I have abbreviated it for this publication). Nikki went on to assist the audience in logging on to Facebook, creating profiles, and demonstrating some of its features. Later, at lunch, I raised my glass to Nikki and said, “Congratulations on your engagement!” Nikki looked a bit befuddled, hunched toward me, and with a hushed voice so as not to cause me embarrassment, said: “You didn’t believe that, did you? I thought you knew I’m straight!” Reputation was not her paramount concern; rather, she did not want to show too much of her disappointment that I did not understand the fluidity of the virtual—and yet very real—social and psychological world she inhabited.

Higher education plug-ins to social networking sites present a second challenge. Here it is not the technology but rather the control and use of the technology that is at issue. With more institutions moving toward commercial sites for student e-mail, calendaring, and document applications, it should not be too long before higher education collaborates with Facebook to link applications for course enrollment, grade checks, and other online student services. InCommon offers security and privacy authentication; technological links, combined with considered contract relations, should close the deal. Let’s “face” it: Facebook has built the site, and students use it; we in higher education should come to recognize that this universal commercial site is here to stay. We should use it for advertising and for communications—and certainly for emergency messaging. The race is on: may the first institution to forge this adventurous type of innovative collaboration win. The “course enroll” sites might just mark the beginning of such connections, soon to be followed by facsimiles of course management and other content-delivery systems.

Finally, global legal and policy concerns represent a third challenge. Civil privacy claims stand out as the first issue. Technology does not create the underlying problem of tongues that wag too loosely, but it does amplify that problem in a way that readily establishes the basis of tortuous liability. These claims may portend more public privacy laws, since among developed nations the United States has ridiculously low standards. Accommodation to stricter international regulations may encourage stronger and more consistent privacy laws in the United States or, if that bar is too high, at least the hope of harmonized privacy policies on the sites with global constituencies. That optimistic perspective should be tempered by the ever-present reality that commercial sites tie “free” services to marketing and advertising business models. Privacy and free speech concerns will always be in tension with commercial interests that seek information about users and their preferences. Of greater consequence is the problem of higher education’s reliance on these sites. What will happen when an advertiser decides to pull its account because it objects to the content generated by a constituent of higher education, which has become dependent on that site for delivery of services?

Social networking continues to be a “cool new tool,” and we should stay connected to its emerging technologies, its social norms and psychological meanings, its advertising and market models, and its legal and policy queries on a global scale. A corporate, commercialized Internet has more money, flexibility, and motivation to innovate than do most business aspects of higher education and is the driving force behind the outsourcing of campus IT services and products. That move toward outsourcing might not be a bad thing. As entrepreneurs continue to push the proverbial envelope of acceptability in gossip and other salacious sites, such as Juicycampus.com, legislators may rethink the Communications Decency Act’s section 230, which provides Internet service providers and sites with immunity from common torts such as defamation. Designed to stimulate the development of the Internet, this immunity is increasingly coming under scrutiny as victims of cyberbullying, libel, and defamation seek to understand the role that technology plays in terms of the scope and scale of damages. ISPs, as passive conduits, are not likely to be implicated, but site owners may acquire more liability under less protective legal regimes. Higher education needs to get out of those kinds of businesses altogether.

Nevertheless, those of us in higher education should be thoughtful about the degree to which outsourcing restricts our control over our products and services in higher education. IT professionals—vice presidents and chief information officers especially—have a responsibility to raise critical questions and perhaps even to teach or coach their administrations about the long-term, and possibly unintended, deleterious consequences of decisions that seem so obvious from a business and financial perspective today. Surrounded by commercialism and its almost irresistible temptations, we must be careful not to sell our souls.

Notes

1. Tracy Mitrano, “Thoughts on Facebook,” Cornell University Office of Information Technologies, IT Policy Office, April 2006, http://www.cit.cornell.edu/policy/memos/facebook.html.

Tracy Mitrano

Tracy Mitrano is the Director of IT Policy and Institute for Computer Policy and Law. Currently she is on the boards of the National Institute for Technology in Liberal Education, Teach Privacy, and Cornell Daily Sun (the independent student newspaper at Cornell University), the Tompkins County Broadband Committee and is co-chair of the Hawkins Leadership Roundtable for EDUCAUSE.

Mitrano writes a blog for Insider Higher Ed entitled "Law, Policy and IT?" This year she published a chapter in the U.K. publication Collection Development in the Digital Age, entitled: "Information Literacy for the Academic Librarian in the Digital Information Age: Supporting Users to Make Effective Use of the Collection." Last fall Mitrano gave the keynote address at a copyright conference at John Cabot University in Rome, Italy. This spring, she will speak at St. Lawrence University on privacy and security of social media.

In May of 2012, Mitrano teams up with the privacy scholar Dan Solove for the first Cornell University-George Washington Law School Forum on Privacy and Information Management. Together with Anne Geyer of UC Berkeley she will give a keynote at the EDUCAUSE Enterprise Conference on Cloud Computing and participate in a full-day session on the same topic at the University of Alaska at Fairbanks in June.

A graduate and faculty member of the Frye Institute, Mitrano served as faculty for EDUCAUSE's Seminars on Academic Computing, the Executive Leadership Institute and the Leadership Institute, and was a member of the EDUCAUSE Board 2006-2010. She served as a member of the InCommon Steering Committee for two terms, from 2004-2010 and has been a frequent speaker at conferences, colleges and universities on the subjects of Internet national and institutional policy, electronic surveillance and government regulation, social networking and privacy. Mitrano has a doctorate in American History from Binghamton University and a law degree from Cornell Law School. Holding an appointment in the Department of Computing Information Science at Cornell University, she sometimes teaches a course "Culture, Law and Politics of the Internet."

 

Tags from the EDUCAUSE Library

Tags from the Community

Most Popular

Stay Up-to-Date

RSS Email Twitter

Share Your Work and Ideas

Issues coming up will focus on designing the future of higher ed, digital engagement, and new business models. Share your work and ideas with EDUCAUSE Review Online.

E-mail us >

Purchase

EDUCAUSE Members: $5.00
Non-Members: $5.00
Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.