Feeds

I'm in privacy trouble ... bitch

On Facebook's Beacon fiasco

Top 5 reasons to deploy VMware with Tegile

Three weeks ago, Facebook unveiled a three prong strategy to monetize its active base of 50m users. (See I'm a walking billboard ... bitch.) It hasn't taken long for one those prongs to go prang.

As we reported earlier today, the privacy-busting referral scheme called Beacon is to be modified. If you buy something elsewhere on the web, this information is piped back into your Facebook profile, so your social network can see what you've just bought.

Facebook already offered something similar, but with an opt-in model. This opted everyone in by default. People don't mind telling friends they've gone to see Led Zepp - they don't necessarily want them to see they've just bought a blow-up doll.

Who would have guessed?

It's damaged Facebook and participating advertisers far more than anyone has realized. Facebook's notoriously weaselly approach to privacy was well in evident, even as it begun to roll out the "fix".

"Facebook already has made changes to ensure that no information is shared unless a user receives notifications ... " the company explained. Note, not "permissions", but "notifications".

In the reader comments, Darren Coleman asks,

"I can't really see how Facebook can make any money outside of the traditional model of invasive banner ads and Adwords. As sites go it's a victim of its own success - you can't monetise the userbase because they'd sooner just jump ship to the next Web 2.0 darling, and if you're seen to be doing anything that could be construed as towing the corporate line (e.g. ads, tracking, etc) then suddenly you're no longer the plucky young upstart website - you're the corporate mouthpiece bought and paid for by the kind of people that talk earnestly about monetisation, incentivising, growing brands, etc. Urgh."

"It's the ultimate self-defeating paradigm."

Good point - is that it, then?

Well, not quite, because there are three ways of making money here, and Facebook is trying them all.

Mark "I'm the CEO ... bitch" Zuckenberg called the referral program the "holy grail" of advertising when he announced it, and it remains a pipe dream.

The other two programs are safer bets: giving advertisers even more slightly accurate demographic information is sure to be welcomed: advertisers currently get nothing at all.

And getting a cut of transactions through Facebook remains an obvious strategy. As I pointed out at the time, however, this may be smaller than many people suppose. A store that shares the transaction revenue with Facebook is only going to be prepared to do so as long as it considers Facebook a part of that transaction. Is Amazon going to be prepared to pay every referrer for a transaction? You can bet not.

Facebook's Beacon experience simply demonstrates that it's been too clever by half: thinking it can do "permission marketing" without your permission.

And the company's impatience and greed also explain why it faces a long drawn out battle with regulators in Europe. Like a Roach Motel, you can join Facebook - but you'll never leave. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.