SlideShare a Scribd company logo
Search Engine Optimization
       and OSINT
    What is it all about?
  And how can it help me?
Data, Data, Data                           Resulting in nearly 8 years of
                                           content uploaded every day!




      5,000 years ago  People started to write
      600 years ago  People started to publish
      43 years ago  The internet was born
      17 years ago  The World Wide Web was invented



    Over 10 million web pages are added to the internet everyday!
    The current Indexed Web contains at least 7.46 billion pages!
Open Source:
Data, Information & Intelligence
 • OSD: Data
 • OSI: Information
 • OSINT: Intelligence
Publicly Available Material

Internet



                                              Traditional Mass Media
                                              - TV         - Radio,
           Geospatial Information             - Newspapers
           - Maps                             - Magazines, etc…
           - Commercial Imagery Products


           - Conferences
           - Specialized Journals
           - Think Tank Studies
Open Source Data (OSD)

Data is the raw print, broadcast, oral debriefing, or other
form of information from a primary source.
It can be a photograph, a tape recording, a commercial
satellite image, or a personal letter from an individual.

ex: reporter embedded with forces in Afghanistan or Iraq.
Taking pictures, talking to soldiers, recording conversations
and firefights, and taking notes with a pen or pencil.
This is considered raw data until it goes through a
conversion process to create a coherent product.
Open Source Information (OSI)
OSI is comprised of the raw data that can be put together, generally by an
editorial process that provides some filtering and validation as well as
presentation management.
OSI is generic information that is usually widely disseminated.
Newspapers, books, broadcasts, and general daily reports are part of the OSI
world.

Ex: a reporter embedded with forces who takes the raw data and converts it into
a meaningful article that is printed in newspapers, magazines or broadcasted
over the air waves. OSI is what a Soldier would purchase at the bookstore inside
the Post Exchange in the form of USA Today or Newsweek.
Open Source Intelligence (OSINT)

OSINT is information that has been deliberately discovered, discriminated,
distilled, and disseminated to a select audience, generally the commander and
his/her immediate staff, in order to address a specific question.
In the case of a battlefield commander, it would more than likely be answering the
priority intelligence requirements (PIR) or specific orders or requests (SOR).
OSINT, in other words, applies the proven process of intelligence to the broad
diversity of open sources of information, and creates intelligence.
Example: The meaningful article above (OSI) that was created from raw data is
used to support an operation. It’s quite possible that a photo accompanying the
article may be of a house known to harbor insurgents. The photo in the article
identifies the location and now can be used to support a tailored operation to
attack the insurgents.
Don’t Let                                     Limit You
Pre-existing research/analysis limitations
                                             Hyper-Personalization
 Language Barrier
 Lack of Cultural Knowledge
                                                  creates the
          Cultural Intelligence                 “Filter Bubble”
 Data
          Unsearchable
          Unavailable


Problem: Unsolicited Search Filter
Algorithmic Limitations
Based on 57 signals
Ex:     • Location
        •   Language
        •   Sign-In
        •   Computer Model
        •   Browser

                                             Eli Pariser – “The Filter Bubble”
Moving Beyond: Academic Journal Search Engines/Databases



                                      Carnegie Endowment
Jstor                                 Brookings Institution
EBSCOHost                             EIU
ProQuest                              RAND
LexisNexis                                      International Crisis Group
Academic Search Premier                         International Institute for Strategic Studies
                                                German Institute for International Politics
                                                Japan Institute of International Affairs




     Recommended: Search Engine Optimization Extensions
                 ext:pdf
                 site:www.THINKTANK.com

                 Dates: 2000..2010
                 -Minus and/or +Plus things in or out
Alternatives to the Google Search Engine:
                      Cluster Based Searches

   Over 85% of everyday searches return different results
      when you use different search engines such as
              Google, Yahoo, Bing and Ask.


DogPile Performs multiple searches
and then aggregates the results into
one quality set of results.

Goal: to give universal results instead
of what one engine thinks may be best
suited for you.

                                          www.dogpile.com

                                                            * Has advanced search
Alternatives to the Google Search Engine:
              Cluster Based Searches
Yippy (formerly known as Clusty)
Ex: Searching for articles and material relating to OSINT.
Instead of doing many different searches, just search for
OSNT and Yippy will gather them into aggregated cluster
groups based on the results; and also show results in
the traditional format - descending in order of relevance.

Goal: Organize search results into clustered themes,                           www.yippy.com
topics and sources.
                                                                        * Has advanced search


                            Quintura Redefines how search results should be
                            displayed using a tag cloud as well as the traditional
                            descending in order of relevance results. Hovering your
                            mouse over the cloud will show alternative options.
                            [method is used to display results for web, images and
                            videos.]

                            Goal: Quicker alternative display using cloud of themed
                            key words
         www.quintura.com
Happy Searching!

More Related Content

Similar to Search engine optimization and osint

Search Analytics for Content Strategists
Search Analytics for Content StrategistsSearch Analytics for Content Strategists
Search Analytics for Content Strategists
Louis Rosenfeld
 
Enterprise Search Share Point2009 Best Practices Final
Enterprise Search Share Point2009 Best Practices FinalEnterprise Search Share Point2009 Best Practices Final
Enterprise Search Share Point2009 Best Practices Final
Marianne Sweeny
 
Enterprise Scale Knowledge Graphs
Enterprise Scale Knowledge GraphsEnterprise Scale Knowledge Graphs
Enterprise Scale Knowledge Graphs
Anant Narayanan
 
Ws rogers spring 2013a
Ws rogers spring 2013aWs rogers spring 2013a
Ws rogers spring 2013aTraciwm
 
Writing Seminar Rogers
Writing Seminar RogersWriting Seminar Rogers
Writing Seminar RogersTraciwm
 
Writing Seminar Rogers
Writing Seminar RogersWriting Seminar Rogers
Writing Seminar RogersTraciwm
 
Writing Seminar Rogers Spring 2012
Writing Seminar Rogers Spring 2012Writing Seminar Rogers Spring 2012
Writing Seminar Rogers Spring 2012Traciwm
 
Thinking about research
Thinking about researchThinking about research
Thinking about research
Cindoroo
 
Writing Seminar Pitts Spring 2012
Writing Seminar Pitts Spring 2012Writing Seminar Pitts Spring 2012
Writing Seminar Pitts Spring 2012Traciwm
 
Writing Seminar Surface
Writing Seminar SurfaceWriting Seminar Surface
Writing Seminar SurfaceTraciwm
 
Writing Seminar Babbitt Spring 2012
Writing Seminar Babbitt Spring 2012Writing Seminar Babbitt Spring 2012
Writing Seminar Babbitt Spring 2012Traciwm
 
Information Markets - A Workshop Approach
Information Markets - A Workshop ApproachInformation Markets - A Workshop Approach
Information Markets - A Workshop Approach
Nils Reimelt, nils@reimelt.org
 
Semtech bizsemanticsearchtutorial
Semtech bizsemanticsearchtutorialSemtech bizsemanticsearchtutorial
Semtech bizsemanticsearchtutorial
Barbara Starr
 
Alt search engines_ocallaghan
Alt search engines_ocallaghanAlt search engines_ocallaghan
Alt search engines_ocallaghan
tamara1066
 
Oss and libraries enabling arabic libraries and creating opportunities
Oss and libraries   enabling arabic libraries and creating opportunitiesOss and libraries   enabling arabic libraries and creating opportunities
Oss and libraries enabling arabic libraries and creating opportunities
Massoud AlShareef
 
Питер Мика "Making the web searchable"
Питер Мика "Making the web searchable"Питер Мика "Making the web searchable"
Питер Мика "Making the web searchable"
Yandex
 
Callcenter HPE IDOL overview
Callcenter HPE IDOL overviewCallcenter HPE IDOL overview
Callcenter HPE IDOL overview
Tania Akinina
 
Federated Search Webinar for SLA (Special Libraries Assoc.)
Federated Search Webinar for SLA (Special Libraries Assoc.)Federated Search Webinar for SLA (Special Libraries Assoc.)
Federated Search Webinar for SLA (Special Libraries Assoc.)
Helen Mitchell
 
05. EDT 513 Week 5 2023 Searching the Internet.pptx
05. EDT 513 Week 5 2023 Searching the Internet.pptx05. EDT 513 Week 5 2023 Searching the Internet.pptx
05. EDT 513 Week 5 2023 Searching the Internet.pptx
Gambari Amosa Isiaka
 

Similar to Search engine optimization and osint (20)

Search Analytics for Content Strategists
Search Analytics for Content StrategistsSearch Analytics for Content Strategists
Search Analytics for Content Strategists
 
Enterprise Search Share Point2009 Best Practices Final
Enterprise Search Share Point2009 Best Practices FinalEnterprise Search Share Point2009 Best Practices Final
Enterprise Search Share Point2009 Best Practices Final
 
Enterprise Scale Knowledge Graphs
Enterprise Scale Knowledge GraphsEnterprise Scale Knowledge Graphs
Enterprise Scale Knowledge Graphs
 
Ws rogers spring 2013a
Ws rogers spring 2013aWs rogers spring 2013a
Ws rogers spring 2013a
 
Writing Seminar Rogers
Writing Seminar RogersWriting Seminar Rogers
Writing Seminar Rogers
 
Writing Seminar Rogers
Writing Seminar RogersWriting Seminar Rogers
Writing Seminar Rogers
 
Writing Seminar Rogers Spring 2012
Writing Seminar Rogers Spring 2012Writing Seminar Rogers Spring 2012
Writing Seminar Rogers Spring 2012
 
Thinking about research
Thinking about researchThinking about research
Thinking about research
 
Writing Seminar Pitts Spring 2012
Writing Seminar Pitts Spring 2012Writing Seminar Pitts Spring 2012
Writing Seminar Pitts Spring 2012
 
Writing Seminar Surface
Writing Seminar SurfaceWriting Seminar Surface
Writing Seminar Surface
 
Writing Seminar Babbitt Spring 2012
Writing Seminar Babbitt Spring 2012Writing Seminar Babbitt Spring 2012
Writing Seminar Babbitt Spring 2012
 
Basics of Web Research for ELA 10
Basics of Web Research for ELA 10Basics of Web Research for ELA 10
Basics of Web Research for ELA 10
 
Information Markets - A Workshop Approach
Information Markets - A Workshop ApproachInformation Markets - A Workshop Approach
Information Markets - A Workshop Approach
 
Semtech bizsemanticsearchtutorial
Semtech bizsemanticsearchtutorialSemtech bizsemanticsearchtutorial
Semtech bizsemanticsearchtutorial
 
Alt search engines_ocallaghan
Alt search engines_ocallaghanAlt search engines_ocallaghan
Alt search engines_ocallaghan
 
Oss and libraries enabling arabic libraries and creating opportunities
Oss and libraries   enabling arabic libraries and creating opportunitiesOss and libraries   enabling arabic libraries and creating opportunities
Oss and libraries enabling arabic libraries and creating opportunities
 
Питер Мика "Making the web searchable"
Питер Мика "Making the web searchable"Питер Мика "Making the web searchable"
Питер Мика "Making the web searchable"
 
Callcenter HPE IDOL overview
Callcenter HPE IDOL overviewCallcenter HPE IDOL overview
Callcenter HPE IDOL overview
 
Federated Search Webinar for SLA (Special Libraries Assoc.)
Federated Search Webinar for SLA (Special Libraries Assoc.)Federated Search Webinar for SLA (Special Libraries Assoc.)
Federated Search Webinar for SLA (Special Libraries Assoc.)
 
05. EDT 513 Week 5 2023 Searching the Internet.pptx
05. EDT 513 Week 5 2023 Searching the Internet.pptx05. EDT 513 Week 5 2023 Searching the Internet.pptx
05. EDT 513 Week 5 2023 Searching the Internet.pptx
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Search engine optimization and osint

  • 1. Search Engine Optimization and OSINT What is it all about? And how can it help me?
  • 2. Data, Data, Data Resulting in nearly 8 years of content uploaded every day! 5,000 years ago  People started to write 600 years ago  People started to publish 43 years ago  The internet was born 17 years ago  The World Wide Web was invented Over 10 million web pages are added to the internet everyday! The current Indexed Web contains at least 7.46 billion pages!
  • 3. Open Source: Data, Information & Intelligence • OSD: Data • OSI: Information • OSINT: Intelligence
  • 4. Publicly Available Material Internet Traditional Mass Media - TV - Radio, Geospatial Information - Newspapers - Maps - Magazines, etc… - Commercial Imagery Products - Conferences - Specialized Journals - Think Tank Studies
  • 5. Open Source Data (OSD) Data is the raw print, broadcast, oral debriefing, or other form of information from a primary source. It can be a photograph, a tape recording, a commercial satellite image, or a personal letter from an individual. ex: reporter embedded with forces in Afghanistan or Iraq. Taking pictures, talking to soldiers, recording conversations and firefights, and taking notes with a pen or pencil. This is considered raw data until it goes through a conversion process to create a coherent product.
  • 6. Open Source Information (OSI) OSI is comprised of the raw data that can be put together, generally by an editorial process that provides some filtering and validation as well as presentation management. OSI is generic information that is usually widely disseminated. Newspapers, books, broadcasts, and general daily reports are part of the OSI world. Ex: a reporter embedded with forces who takes the raw data and converts it into a meaningful article that is printed in newspapers, magazines or broadcasted over the air waves. OSI is what a Soldier would purchase at the bookstore inside the Post Exchange in the form of USA Today or Newsweek.
  • 7. Open Source Intelligence (OSINT) OSINT is information that has been deliberately discovered, discriminated, distilled, and disseminated to a select audience, generally the commander and his/her immediate staff, in order to address a specific question. In the case of a battlefield commander, it would more than likely be answering the priority intelligence requirements (PIR) or specific orders or requests (SOR). OSINT, in other words, applies the proven process of intelligence to the broad diversity of open sources of information, and creates intelligence. Example: The meaningful article above (OSI) that was created from raw data is used to support an operation. It’s quite possible that a photo accompanying the article may be of a house known to harbor insurgents. The photo in the article identifies the location and now can be used to support a tailored operation to attack the insurgents.
  • 8.
  • 9. Don’t Let Limit You Pre-existing research/analysis limitations Hyper-Personalization Language Barrier Lack of Cultural Knowledge creates the Cultural Intelligence “Filter Bubble” Data Unsearchable Unavailable Problem: Unsolicited Search Filter Algorithmic Limitations Based on 57 signals Ex: • Location • Language • Sign-In • Computer Model • Browser Eli Pariser – “The Filter Bubble”
  • 10. Moving Beyond: Academic Journal Search Engines/Databases Carnegie Endowment Jstor Brookings Institution EBSCOHost EIU ProQuest RAND LexisNexis International Crisis Group Academic Search Premier International Institute for Strategic Studies German Institute for International Politics Japan Institute of International Affairs Recommended: Search Engine Optimization Extensions ext:pdf site:www.THINKTANK.com Dates: 2000..2010 -Minus and/or +Plus things in or out
  • 11. Alternatives to the Google Search Engine: Cluster Based Searches Over 85% of everyday searches return different results when you use different search engines such as Google, Yahoo, Bing and Ask. DogPile Performs multiple searches and then aggregates the results into one quality set of results. Goal: to give universal results instead of what one engine thinks may be best suited for you. www.dogpile.com * Has advanced search
  • 12. Alternatives to the Google Search Engine: Cluster Based Searches Yippy (formerly known as Clusty) Ex: Searching for articles and material relating to OSINT. Instead of doing many different searches, just search for OSNT and Yippy will gather them into aggregated cluster groups based on the results; and also show results in the traditional format - descending in order of relevance. Goal: Organize search results into clustered themes, www.yippy.com topics and sources. * Has advanced search Quintura Redefines how search results should be displayed using a tag cloud as well as the traditional descending in order of relevance results. Hovering your mouse over the cloud will show alternative options. [method is used to display results for web, images and videos.] Goal: Quicker alternative display using cloud of themed key words www.quintura.com