Strategies for covert Web search

George R.S. Weir, David Igbako

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

1 Citation (Scopus)

Abstract

Web search engines provide easy access to a wealth of open access information but depend for their optimal use upon careful selection of search terms in order to return a high proportion of relevant information. Generally, this implies a clear association between the meaning of the chosen search expression and the information needs of the searcher. In contrast, this paper considers a scenario in which the searcher may wish to retrieve information without making their information requirements transparent. We argue that careful choice of search strategy can also facilitate retrieval of relevant information in a covert fashion that conceals the searcher's intention by ensuring return of a majority of irrelevant search hits.
Original languageEnglish
Title of host publicationFourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013
Place of PublicationPiscataway, NJ, United States
PublisherIEEE
Pages50-57
Number of pages8
ISBN (Print)9781479930753
DOIs
Publication statusPublished - 2013

Fingerprint

Search engines
World Wide Web

Keywords

  • covert Web search
  • hiding intent
  • obfuscation techniques
  • information retrieval

Cite this

Weir, G. R. S., & Igbako, D. (2013). Strategies for covert Web search. In Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013 (pp. 50-57). Piscataway, NJ, United States: IEEE. https://doi.org/10.1109/CTC.2013.10
Weir, George R.S. ; Igbako, David. / Strategies for covert Web search. Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013. Piscataway, NJ, United States : IEEE, 2013. pp. 50-57
@inproceedings{4acdee83f9f44ff69c2157772e89aa7d,
title = "Strategies for covert Web search",
abstract = "Web search engines provide easy access to a wealth of open access information but depend for their optimal use upon careful selection of search terms in order to return a high proportion of relevant information. Generally, this implies a clear association between the meaning of the chosen search expression and the information needs of the searcher. In contrast, this paper considers a scenario in which the searcher may wish to retrieve information without making their information requirements transparent. We argue that careful choice of search strategy can also facilitate retrieval of relevant information in a covert fashion that conceals the searcher's intention by ensuring return of a majority of irrelevant search hits.",
keywords = "covert Web search, hiding intent, obfuscation techniques, information retrieval",
author = "Weir, {George R.S.} and David Igbako",
year = "2013",
doi = "10.1109/CTC.2013.10",
language = "English",
isbn = "9781479930753",
pages = "50--57",
booktitle = "Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013",
publisher = "IEEE",

}

Weir, GRS & Igbako, D 2013, Strategies for covert Web search. in Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013. IEEE, Piscataway, NJ, United States, pp. 50-57. https://doi.org/10.1109/CTC.2013.10

Strategies for covert Web search. / Weir, George R.S.; Igbako, David.

Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013. Piscataway, NJ, United States : IEEE, 2013. p. 50-57.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

TY - GEN

T1 - Strategies for covert Web search

AU - Weir, George R.S.

AU - Igbako, David

PY - 2013

Y1 - 2013

N2 - Web search engines provide easy access to a wealth of open access information but depend for their optimal use upon careful selection of search terms in order to return a high proportion of relevant information. Generally, this implies a clear association between the meaning of the chosen search expression and the information needs of the searcher. In contrast, this paper considers a scenario in which the searcher may wish to retrieve information without making their information requirements transparent. We argue that careful choice of search strategy can also facilitate retrieval of relevant information in a covert fashion that conceals the searcher's intention by ensuring return of a majority of irrelevant search hits.

AB - Web search engines provide easy access to a wealth of open access information but depend for their optimal use upon careful selection of search terms in order to return a high proportion of relevant information. Generally, this implies a clear association between the meaning of the chosen search expression and the information needs of the searcher. In contrast, this paper considers a scenario in which the searcher may wish to retrieve information without making their information requirements transparent. We argue that careful choice of search strategy can also facilitate retrieval of relevant information in a covert fashion that conceals the searcher's intention by ensuring return of a majority of irrelevant search hits.

KW - covert Web search

KW - hiding intent

KW - obfuscation techniques

KW - information retrieval

UR - http://www.scopus.com/inward/record.url?scp=84898043311&partnerID=8YFLogxK

UR - http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6751594

U2 - 10.1109/CTC.2013.10

DO - 10.1109/CTC.2013.10

M3 - Conference contribution book

SN - 9781479930753

SP - 50

EP - 57

BT - Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013

PB - IEEE

CY - Piscataway, NJ, United States

ER -

Weir GRS, Igbako D. Strategies for covert Web search. In Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013. Piscataway, NJ, United States: IEEE. 2013. p. 50-57 https://doi.org/10.1109/CTC.2013.10