Strategies for covert Web search

George R.S. Weir, David Igbako

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

1 Citation (Scopus)

Abstract

Web search engines provide easy access to a wealth of open access information but depend for their optimal use upon careful selection of search terms in order to return a high proportion of relevant information. Generally, this implies a clear association between the meaning of the chosen search expression and the information needs of the searcher. In contrast, this paper considers a scenario in which the searcher may wish to retrieve information without making their information requirements transparent. We argue that careful choice of search strategy can also facilitate retrieval of relevant information in a covert fashion that conceals the searcher's intention by ensuring return of a majority of irrelevant search hits.
Original languageEnglish
Title of host publicationFourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013
Place of PublicationPiscataway, NJ, United States
PublisherIEEE
Pages50-57
Number of pages8
ISBN (Print)9781479930753
DOIs
Publication statusPublished - 2013

Keywords

  • covert Web search
  • hiding intent
  • obfuscation techniques
  • information retrieval

Fingerprint Dive into the research topics of 'Strategies for covert Web search'. Together they form a unique fingerprint.

  • Cite this

    Weir, G. R. S., & Igbako, D. (2013). Strategies for covert Web search. In Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013 (pp. 50-57). IEEE. https://doi.org/10.1109/CTC.2013.10