Adversarial web search
Author(s)
Bibliographic Information
Adversarial web search
(Foundations and trends in information retrieval, 4:5)
Now Publishers, c2011
Available at / 2 libraries
-
No Libraries matched.
- Remove all filters.
Description and Table of Contents
Description
Web search engines have become indispensable tools for finding content. As the popularity of the Web has increased, the efforts to exploit the Web for commercial, social, or political advantage have grown, making it harder for search engines to discriminate between truthful signals of content quality and deceptive attempts to improve search engines' rankings. This problem is further complicated by the open nature of the Web, which allows anyone to write and publish anything, and by the fact that search engines must analyze ever-growing numbers of Web pages. Moreover, increasing expectations of users, who over time rely on Web search for information needs related to more aspects of their lives, further deepen the need for search engines to develop effective counter-measures against deception.
Adversarial Web Search considers the effects of the adversarial relationship between search systems and those who wish to manipulate them, a field known as ""Adversarial Information Retrieval"". It shows that search engine spammers create false content and misleading links to lure unsuspecting visitors to pages filled with advertisements or malware. It also examines work over the past decade or so that aims to discover such spamming activities to get spam pages removed or their effect on the quality of the results reduced.
Research in Adversarial Information Retrieval has been evolving over time, and currently continues both in traditional areas (e.g., link spam) as well as newer areas, such as click fraud and spam in social media, demonstrating that this conflict is far from over.
Table of Contents
1: Introduction 2: Overview of search engine spam detection 3: Dealing with content spam and plagiarized content 4: Curbing nepotistic linking 5: Propagating trust and distrust 6: Detecting spam in usage data 7: Fighting spam in user-generated content 8: Discussion. Acknowledgements. References.
by "Nielsen BookData"