Notes to Search Engines and Ethics

1. For those interested in more detail about some of the technical concepts described here (such as TCP/IP, FTP, etc.), as well as the important roles that these technologies and protocols played in the historical development of the Internet, some excellent resources are available. See, for example, Abbate (1999).

2. For a theory of privacy that defends the notion of “limited control,” as opposed to a full-blown “control theory” of privacy, see Moor 1997; Tavani and Moor 2001; Tavani 2007).

Copyright © 2012 by
Herman Tavani <htavani@rivier.edu>

Open access to the SEP is made possible by a world-wide funding initiative.
Please Read How You Can Help Keep the Encyclopedia Free


The SEP would like to congratulate the National Endowment for the Humanities on its 50th anniversary and express our indebtedness for the five generous grants it awarded our project from 1997 to 2007. Readers who have benefited from the SEP are encouraged to examine the NEH’s anniversary page and, if inspired to do so, send a testimonial to neh50@neh.gov.