Evaluation of Search Engines Concerning Environmental Terms

Total Page:16

File Type:pdf, Size:1020Kb

Evaluation of Search Engines Concerning Environmental Terms EnviroInfo 2001: Sustainability in the Information Society Copyright 2001 Metropolis Verlag, Marburg, ISBN: 3-89518-370-9 Evaluation of Search Engines Concerning Environmental Terms Kristina Voigt1 and Gerhard Welzl 1. Evaluation of Search Engines Ecometrical and chemometrical methods are essential in environmental sciences in general and extremely important in environment information management. The main topics in the discipline of environmental informatics are data analysis and Geographical Information Systems (GIS) [Rautenstrauch 2000]. Scientific information is more and more buried in the proliferation of commercial sites on the Internet. The aim is to select the right search engine(s) or other user supporting Internet resources, like e.g. metadatabases in order to find scientific environmental information. Different types of search engines are available, e.g. manually-indexed search engines, robot-indexed search engines, meta search engines and context-specific search engines. The evaluation of search engines is a very hot topic in information science these days [Harter 1997]. Most evaluation methods use the well-established measures of recall and precision. Our initial step in the evaluation of search engines was the selection of search engine(s) for environmental and chemical questions. Then the evaluation of the effectiveness of search engines with respect to environmental and chemical evaluation criteria is performed. The evaluation terms are "environmental informatics", "uranium" and "ecological farming". These three terms will be evaluated by the following criteria • Number of hits • Relevance of hits (only the first 10 hits are looked upon) • Scientific hits or newspaper articles (only the first 10 hits will be looked upon) 1 Dr. Kristina Voigt, Dr. Gerhard Welzl, GSF - Forschungszentrum für Umwelt und Gesund- heit, Institut für Biomathematik und Biometrie, Ingolstädter Landstr. 1, D-85764 Neuherberg e-mail: [email protected], [email protected], Internet: http://www.gsf.de/institute/ibb/voigt 686 Table 1 21 Search Engines (7 common, 7 meta, 7 environmental), 9 evaluation criteria Search Engine Abr$ Ei- Ein Ein Ura Ura Ura Far Far Far nu rel sci - -rel sci - -rel sci m nu nu m m AltaVista ALT 2 1 1 2 2 2 2 2 1 Google GOO 2 2 2 2 1 1 2 2 1 Fast Search FAS 2 1 2 2 2 1 1 2 0 NorthernLight NOR 1 2 2 2 2 1 1 2 1 HotBot HOT 1 2 2 1 2 1 1 2 1 Excite EXC 2 2 2 1 2 1 2 2 1 Yahoo YAH 1 2 2 1 2 2 0 2 2 Ixquick IXQ 2 1 1 1 1 1 1 2 2 MetaCrawler MET 0 1 1 1 2 2 1 2 1 ProFusion PRO 1 0 2 1 1 0 1 2 0 Meta Ger MGE 1 2 2 1 2 0 1 2 2 MetaIQ MIQ 1 1 1 1 2 1 1 1 0 Search.com SEA 0 2 1 0 2 2 0 2 1 Multimeta MUL 1 0 0 1 2 1 1 2 1 GEIN GEI 1 1 2 1 1 2 1 2 2 US-EPA EPA 0 0 0 0 2 2 0 1 1 US-FDA FDA 1 0 2 0 2 2 1 2 2 Umweltbundesamt UBA 0 0 0 0 0 0 0 2 1 European Env. Agen. EEA 0 1 1 0 0 0 0 1 1 NIOSH NIO 0 0 0 1 2 2 0 0 0 Min. Env. DK EDK 0 0 0 0 0 0 0 1 1 The following 9 criteria are taken into account: Einnum: Environmental informatics, number of chemicals, Einrel: Environmental informatics, relevance of hits, Einsci: Environmental informatics, scientific hits, Uranum: Uranium, number of hits, Urarel: Uranium, relevance of hits, Urasci: Uranium, scientific hits, Farnum: Ecological farming, number of hits, Farrel: Ecological farming, relevance of hits, Farsci: Ecological farming, scientific hits. For pragmatic reasons we chose a very simple scoring approach using only 0 (bad), 1 (middle), 2 (good). In Table 1 the data-matrix of 21 objects (search engines) and 9 attributes (evaluation terms given above) and their scores are listed. Every term has three different categories, number retrieved in search engine, relevance of hits (10), and scientific form of hits (10). The data-matrix will be analyzed using the following methods. Copyright 2001 Metropolis Verlag, Marburg, ISBN: 3-89518-370-9 687 2. Different Multi-Criteria Analysis Methods In the fields of environmental and chemical questions a large number of data as well as complex processes and structures are to be analyzed. A variety of multivariate statistical methods (e.g. Principle Component Analysis, Multidimensional Scaling, POSAC - Partially Ordered Scalogram Analysis with Coordinates) and methods from the field of discrete mathematics (e.g. Hasse Diagram Technique) are applied to investigate the environmental, chemical data on the Internet. These methods have already been used to investigate environmental and chemical resources [Voigt 1998], [Voigt 2000]. The basis of the Hasse diagram technique is the assumption that a ranking can be performed while avoiding the use of an ordering index. Hasse diagrams are extremely useful if several criteria are given to decide which objects are priority objects. Hasse diagrams visualize the order relations within posets. Two objects x, y of a poset are ordered if all scores of x are less or equal than those of y. Hasse diagrams are oriented graphs (acyclic digraphs). A digraph consists of a set E of objects drawn as small circles in Hasse diagrams. In our applications the circles near the top of the page (of the Hasse diagram) indicate objects that are the "better" objects according to the criteria used to rank them: These objects have no predecessors (they are not "covered" by other objects) but successors and are called maximal objects. Those objects found in the lowest part of the diagrams and are only connected by lines in the upward direction, are called minimal objects. Main theoretical articles on the development of the partial order ranking methods are given by Halfon and Brüggemann [Halfon 1998] and [Brüggemann 2000]. In the multivariate statistical analysis the emphasis lies in scaling or ordering variables or objects. In this respect several strategies are known. Here we apply the Partially Ordered Scalogram Analysis with Coordinates (POSAC) method which is a module in the program package Systat 10 [SPSS Science 2001] under the feature of statistics, data reduction. The POSAC method reduces the data-matrix in plotting it in a two-dimensional space. Part of information (given in percentage in the program) is lost by this method. In POSAC, order relations (comparability as well as incomparability of the structuples) are considered as the essential empirical- substantive aspect of the data to be preserved in the data analysis [Borg 1995]. 3. Results of the data-analyses 3.1 Application of Hasse diagram technique The Hasse diagram technique is applied in the first step of the data-analysis. It shows the diagram given in Figure 1. This diagram shows 5 levels with 10 objects in the largest level. The number of maximal objects is 10, the number minimal objects comprises 4. Most of the common search engines AltaVista, Google, FastSearch, Copyright 2001 Metropolis Verlag, Marburg, ISBN: 3-89518-370-9 688 NorthernLight, Exite and Yahoo are maximal objects. The meta search engines Ixquick, MetaGer are also maximal objects. The environmental-specific search engines GEIN-German Environmental Information Network and US-FDA (Food and Drug Administration) are found in the maximal position of the Hasse diagram. It can be visualized that some maximal objects like e.g. FAS (FastSearch) and GOO (Google) have only few predecessors whereas other maximal objects, e.g. EXC (Excite) and ALT (AltaVista) dispose of several predecessors. In the minimal position the meta search engines ProFusion and MetaIQ as well as the context- specific search engines NIOSH (National Institute for Occupational Safety and Health) and Ministry of the Environment Denmark are given. Figure 1: Hasse diagram for 21 search engines evaluated by 9 environmental criteria (left) and 2 latent order variables (right) 3.2 Application of the POSAC method and combination with HDT The same 21 x 9 data-matrix is now analyzed applying the POSAC method described above. POSAC reduces the data-matrix into a two-dimensional space. The two dimensions are called latent order variables (LOV). In this example 75,5 % of profile pairs are correctly represented. In the next step of the evaluation procedure for this data-matrix we calculate a Hasse diagram for the two latent order variables found by the POSAC method. The result of this analysis is given in Figure 2. This Hasse diagram only represents 76 % of the original diagram given in Figure 1 correctly. The left side of the diagram is represented by high values for LOV1. These are essentially the standard search engines like Google, NorthernLight, FastSearch, and AltaVista. The exception is Yahoo, which is a manually-indexed search engine. The special position can be explained by this fact. The objects found on the right hand side are represented by Copyright 2001 Metropolis Verlag, Marburg, ISBN: 3-89518-370-9 689 high values for LOV2. These are mainly environmental-specific search engines, e.g. GEIN, EPA, UBA, FDA etc. Some meta search engines are also found in this area of the diagram. Figure 2: Hasse diagram 21 objects, 2 variables (latent order variables) In order to increase the background of the influence of the attributes on the whole analysis, we perform a correlation analysis of the two latent order variables (LOV) given in the POSAC plot. This is achieved by applying an analysis of variance (ANOVA). With the help of ANOVA it can be demonstrated that LOV1 is essenti- ally described by Uranum (Uranium number of hits), whereas LOV2 is dominated by Farsci (Ecological farming, scientific hits).
Recommended publications
  • Online-Quellen Nutzen: Recherche Im Internet
    ONLINE-QUELLEN NUTZEN: RECHERCHE IM INTERNET Katharina Gilarski, Verena Müller, Martin Nissen (Stand: 08/2020) Inhaltsverzeichnis 1 Recherche mit Universalsuchmaschinen ............................................................. 2 1.1 Clever googlen ......................................................................................................... 2 1.2 Suchoperatoren für die einfache Suche ................................................................... 2 1.3 Die erweiterte Suche mit Google .............................................................................. 3 1.4 Die umgekehrte Bildersuche mit Google .................................................................. 4 1.5 Das Geheimnis der Treffersortierung in Google ....................................................... 5 1.6 Alternative universelle Suchmaschinen .................................................................... 6 1.7 Surface vs. Deep Web ............................................................................................. 9 1.8 Vor- und Nachteile von universellen Suchmaschinen ............................................. 10 1.9 Bewertung von Internetquellen ............................................................................... 10 2 Recherche mit wissenschaftlichen Suchmaschinen ......................................... 11 2.1 Google Scholar: Googles Suchmaschine für Wissenschaftler ................................ 11 2.2 Suchmöglichkeiten von Google Scholar ................................................................
    [Show full text]
  • Merging Multiple Search Results Approach for Meta-Search Engines
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by D-Scholarship@Pitt MERGING MULTIPLE SEARCH RESULTS APPROACH FOR META-SEARCH ENGINES By Khaled Abd-El-Fatah Mohamed B.S-------- Cairo University, Egypt, 1995 M.A-------Cairo University, Egypt, 1999 M.A------- University of Pittsburgh 2001 Submitted to the Graduate Faculty of School of Information Sciences in Partial Fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2004 UNIVERSITY OF PITTSBURGH INFORMATION SCIENCES This dissertation was presented by Khaled Abd-El-Fatah Mohamed It was defended on Janauary 29, 2004 and approved by Chris Tomer, PhD, Associate Professor, DLIS Jose-Marie Griffiths, PhD, Professor, DLIS Don King, Research Professor, DLIS Amy Knapp, PhD, ULS Dissertation Director: Chris Tomer, PhD, Associate Professor MERGING MULTIPLE SEARCH RESULTS APPROACH FOR META-SEARCH ENGINES Khaled A. Mohamed, PhD University of Pittsburgh, 2004 Meta Search Engines are finding tools developed for enhancing the search performance by submitting user queries to multiple search engines and combining the search results in a unified ranked list. They utilized data fusion technique, which requires three major steps: databases selection, the results combination, and the results merging. This study tries to build a framework that can be used for merging the search results retrieved from any set of search engines. This framework based on answering three major questions: 1. How meta-search developers could define the optimal rank order for the selected engines. 2. How meta-search developers could choose the best search engines combination. 3. What is the optimal heuristic merging function that could be used for aggregating the rank order of the retrieved documents form incomparable search engines.
    [Show full text]
  • Crypto Course Magdeburg 23. November 2019
    Crypto Course Magdeburg 23. November 2019 Jan & Julia Digitalcourage e.V. ▶ non-profit association for data protection and civil rights ▷ "for a world worth living in the digital age" ▷ Big Brother Awards ▷ Actions on current topics ▶ Digitalcourage university group Bielefeld (www.digitalcourage.de/hsg-bi) ▷ CryptoParties, Backup Parties, Linux Install Parties ▷ Regular meetings at the university CryptoParty ▶ Digital self-defense ▶ Protection against mass surveillance ▶ Beginner friendly ▶ Public, non-commercial, worldwide ▶ By users for users ▶ Join in and become part of the CryptoParty movement ▶ https://cryptoparty.in The Course at a Glance ▶ Why should I learn how to encrypt? ▶ How to secure my browser ▶ Basics of smartphone security LET'S GO! The Course at a Glance ▶ Why should I learn how to encrypt? ▶ How to secure my browser ▶ Basics of smartphone security Digital Identity Metadata ▶ Search terms (Search History) ▶ Entered, seen, clicked ▶ IP address ▶ Language ▶ Date, time ▶ Device, operating system, browser ▶ Location (GPS or Browser) ▶ https://myactivity.google.com/ Google Services To no one you are more honest than to the search field of google. Privacy Why do we need privacy? ▶ „The right to be left alone.“ ▶ Free development of personality ▶ Control over the consequences of one's own actions ▶ Self-determination (who knows what about me) ▶ Protection against criticism and discrimination ▶ Security (passwords, property,...) ▶ Freedom ▶ Intimacy? ▷ IMPORTANT FOR THE INDIVIDUAL Why does a society need privacy? ▶ Important
    [Show full text]
  • A Baker's Dozen of Tips for Be Er Web Searches
    A Baker’s Dozen of Tips for Beer Web Searches Anne Burnett, J.D., M.L.I.S. University of Georgia School of Law Library Athens, Georgia Lawyers use the § ABA Tech Report 2019 web for legal § 90% use free online resources research either regularly or occasionally When to use free resources § If item(s) likely to be freely available § If starting with free & switching to When do subscription for supplemental lawyers use the material will save $$$ web for § If time spent on free doesn’t outweigh research? $$ spent on paid § Recent primary legal information § Government information What is free § Company and directory information web good for? § Information about individuals § Reference information and statistics § Comprehensive sites--collecting all relevant material, from all jurisdictions § High quality, reliable secondary sources What is not § Annotated codes, cases with available? headnotes § Sophisticated citator services, such as Shepard's or KeyCite § Older materials The Tips Use Quotation Marks • Phrase searching • “consumer protection” #1 Can I Quote You? • “John F. Kennedy” • Single word in precise form • “childcare” ≠ “child care” Space = AND Google and Bing recognize OR Minus sign excludes terms • RICO –Puerto #2 • Vikings –football –team Smooth Operators AROUND(x) – proximity operator • John AROUND(2) Kennedy • John F. Kennedy • John Fitzgerald Kennedy • John Kennedy • Kennedy, John F. Limit by • Domain: .edu, .org., .gov, .int, -.com, .de • File type: .pdf, .com, .ppt, .xls • Language #3 • Country Learn Your Limits • Last update
    [Show full text]
  • Intercultural Dimensions of E-Learning
    Using the Internet for Intercultural Training! A pilot study of web sites in English for children, young adults, teachers and trainers - EUMC Using the Internet for Intercultural Training! A pilot study of web sites in English for children, young adults, teachers and trainers Vienna, September 2003 1 Using the Internet for Intercultural Training! A pilot study of web sites in English for children, young adults, teachers and trainers - EUMC Using the Internet for Intercultural Training! A pilot study of web sites in English for children, young adults, teachers and trainers on behalf of the European Monitoring Centre on Racism and Xenophobia (EUMC) by Andreas Hieronymus iMiR - Institut fuer Migrations- und Rassismusforschung Vienna, September 2003 2 Using the Internet for Intercultural Training! A pilot study of web sites in English for children, young adults, teachers and trainers - EUMC DISCLAIMER This Report has been carried out by Dr. Andreas Hieronymus at the Institut für Migrations- und Rassismusforschung (IMIR) on behalf of the EUMC. The opinions expressed by the author do not necessarily reflect the position of the EUMC. Reproduction is authorized, except for commercial purposes, provided the source is acknowledged and the attached text accompanies any reproduction: “This study has been carried out on behalf of the European Monitoring Centre on Racism and Xenophobia (EUMC). The opinions expressed by the author do not necessarily reflect the position of the EUMC. This publication contain references, and pointers, to information maintained by other organisations, over which the EUMC has no control and for which the EUMC assumes no responsibility. Please note that we do not control and cannot guarantee the relevance, timeliness or accuracy of outside materials.
    [Show full text]
  • Senioren Im Internet : Theoretisch Fundierte Ansatzpunkte Zur Zielgerichteten Ansprache Der Senioren- Community-Szene / Mario Peskes
    = â~ëëÉä= = = ìåáîÉêëáíó= = éêÉëë= = = = = = = = = = = = = = = = = = pÉåáçêÉå=áã=fåíÉêåÉí= Theoretisch fundierte Ansatzpunkte zur zielgerichteten Ansprache der Senioren-Community-Szene Mario Peskes Die Deutsche Bibliothek - CIP-Einheitsaufnahme Peskes, Mario Senioren im Internet : Theoretisch fundierte Ansatzpunkte zur zielgerichteten Ansprache der Senioren- Community-Szene / Mario Peskes. - Kassel : kassel univ. press, 2001. - XVII, 296 S. : Ill. Zugl.: Kassel, Univ., Diss. 2000 ISBN 3-933146-53-4 © 2001, kassel university press GmbH, Kassel Das Werk einschließlich aller seiner Teile ist urheberrechtlich geschützt. Jede Verwertung außerhalb der en- gen Grenzen des Urheberrechtsschutzgesetzes ist ohne Zustimmung des Verlags unzulässig und strafbar. Das gilt insbesondere für Vervielfältigungen, Übersetzungen, Mikroverfilmungen und die Einspeicherung und Verarbeitung in elektronischen Systemen. Umschlaggestaltung: 5 Büro für Gestaltung, Kassel Druck und Verarbeitung: Zentraldruckerei der Universität Gesamthochschule Kassel Printed in Germany Für meine Eltern „Ein Kunde ist die jeweils wichtigste Person im Betrieb. Er ist nicht von uns abhängig, sondern wir von ihm. Er bedeutet keine Unterbrechung in unserer Arbeit, sondern er ist ihr Inhalt. Er ist kein Außenseiter unseres Geschäftes, er ist ein Teil von ihm. Er ist niemand, mit dem man sich streitet. Denn niemand wird je- mals einen Streit mit einem Kunden gewinnen. Ein Kunde ist eine Person, die uns ihre Wünsche mitteilt. Unsere Aufgabe ist es, diese zu seiner und unserer Zufriedenheit auszuführen.“ Quelle: Hans Heinrich Pate im Kloster Eismeer (ca. 12. Jahrhundert) VORWORT Der Anstoß zur vorliegenden Arbeit ergab sich aus der Abfassung meiner Diplomarbeit, die sich mit der Thematik des Konsumentenverhaltens befaßte. Während der Literatur- recherche stieß ich auf Quellen, die darauf hinwiesen, daß die demographische Entwicklung wie auch der große Fortschritt der interaktiven Medien das Marketing mehr und mehr beeinflussen werden.
    [Show full text]
  • OSINT Handbook September 2020
    OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information.
    [Show full text]
  • Searching for Audiovisual Content Cover [6Mm].Indd 1 2/12/08 16:35:39 IRIS Special: Searching for Audiovisual Content
    Available in English, Special Serie French and German What can you expect from IRIS Special What is the source of the IRIS Special in terms of content? expertise? Published by the European IRIS Special is a series of publications from the European Every edition of IRIS Special is produced by the European Audiovisual Observatory that provides you comprehensive Audiovisual Observatory’s legal information department in Audiovisual Observatory factual information coupled with in-depth analysis. The themes cooperation with its partner organisations and an extensive chosen for IRIS Special are all topical issues in media law, which network of experts in media law. we explore for you from a legal perspective. IRIS Special’s The themes are either discussed at invitation-only workshops approach to its content is tri-dimensional, with overlap in or tackled by selected guest authors. Workshop participants some cases, depending on the theme. It offers: and authors are chosen in order to represent a wide range of 1. a detailed survey of relevant national legislation to facilitate professional, academic, national and cultural backgrounds. comparison of the legal position in different countries, for example IRIS Special: Broadcasters’ Obligations to Invest in IRIS Special - unique added value Cinematographic Production describes the rules applied by IRIS Special publications explore selected legal themes in a way that 34 European states; makes them accessible not just to lawyers. Every edition combines 2. identification and analysis of highly relevant issues, a high level of practical relevance with academic rigour. covering legal developments and trends as well as suggested While IRIS Special concentrates on issues and interactions solutions: for example IRIS Special, Audiovisual Media within Europe, it takes a broader geographical scope when the Services without Frontiers – Implementing the Rules offers theme so requires.
    [Show full text]
  • Individual OPSEC & Personal Security
    INDIVIDUAL OPSEC & PERSONAL SECURITY Includes: Information Security (INFOSEC) and Operations Security (OPSEC) for Government Employees Michael Chesbro Individual OPSEC & Personal Security September 1, 2017 How to Use This Guide This document is intended to be a guide or index of information and resources that you can use to make your life a little bit more secure. As you read the information provided here you may find things that are directly applicable to your life and that you will want to implement immediately. Other things we will discuss here will be, perhaps, less applicable to you, but may be very useful to someone else. Use what you find to be useful, and skip that which seem less valuable to you. Don’t feel that you have to do everything listed here to add security to your life, or that you somehow create a vulnerability in your life if there is a security recommendation that you choose not to implement. Each person’s life is different, and we all have different security needs that may change over time. Security isn’t about the number of security measures that you implement, rather it is about understanding the threats that you face in your life, and determining what countermeasures you will implement against those threats. Throughout this guide I have provided direct links to information and resources on the Internet. Use these links to gather more information and to implement OPSEC and personal security techniques that are applicable in your life. On the day I published this guide, all of the links worked and returned the information referenced.
    [Show full text]
  • The Onion Crate - Tor Hidden Service Index
    onion.to does not host this content; we are simply a conduit connecting Internet users to content hosted inside the Tor network.. onion.to does not provide any anonymity. You are strongly advised to download the Tor Browser Bundle and access this content over Tor. For more information see our website for more details and send us your feedback. hide Tor2web header Online onions The Onion Crate - Tor Hidden Service Index nethack3dzllmbmo.onion A public nethack server. j4ko5c2kacr3pu6x.onion/wordpress Paste or blog anonymously, no registration required. redditor3a2spgd6.onion/r/all Redditor. Sponsored links 5168 online onions. (Ctrl-f is your friend) A AUTOMATED PAYPAL AND CREDIT CARD MARKET 2222bbbeonn2zyyb.onion A Beginner Friendly Comprehensive Guide to Installing and Using A Safer yuxv6qujajqvmypv.onion A Coca Growlog rdkhliwzee2hetev.onion ==> https://freenet7cul5qsz6.onion.to/freenet:USK@yP9U5NBQd~h5X55i4vjB0JFOX P97TAtJTOSgquP11Ag,6cN87XSAkuYzFSq-jyN- 3bmJlMPjje5uAt~gQz7SOsU,AQACAAE/cocagrowlog/3/ A Constitution for the Few: Looking Back to the Beginning ::: Internati 5hmkgujuz24lnq2z.onion ==> https://freenet7cul5qsz6.onion.to/freenet:USK@kpFWyV- 5d9ZmWZPEIatjWHEsrftyq5m0fe5IybK3fg4,6IhxxQwot1yeowkHTNbGZiNz7HpsqVKOjY 1aZQrH8TQ,AQACAAE/acftw/0/ A Declaration of the Independence of Cyberspace ufbvplpvnr3tzakk.onion ==> https://freenet7cul5qsz6.onion.to/freenet:CHK@9NuTb9oavt6KdyrF7~lG1J3CS g8KVez0hggrfmPA0Cw,WJ~w18hKJlkdsgM~Q2LW5wDX8LgKo3U8iqnSnCAzGG0,AAIC-- 8/Declaration-Final%5b1%5d.html A Dumps Market - Dumps, Cloned Cards,
    [Show full text]
  • Theologie Studieren Einführung Ins Wissenschaftliche Arbeiten
    Theologie studieren Einführung ins wissenschaftliche Arbeiten HERDER Albert Raffelt Theologie studieren GRUNDLAGEN THEOLOGIE Albert Raffelt Theologie studieren Einführung ins wissenschaftliche Arbeiten 7. Auflage HERDER FREIBURG • BASEL WIEN Vorangegangene Auflagen: 1.-5. Auflage: Proseminar Theologie: 1975, 21977, 31981, 41985, 51992 6. Auflage: Theologie studieren. Wissenschaftliches Arbeiten und Medien­ kunde: 2003 Überarbeitete und erweiterte Neuausgabe (7. Auflage des Gesamtwerks) © Verlag Herder GmbH, Freiburg im Breisgau 2008 Alle Rechte Vorbehalten www.herder.de Einbandgestaltung: Finken & Bumiller, Stuttgart Satz: Barbara Herrmann, Freiburg Herstellung: fgb • freiburger graphische betriebe www.fgb.de Gedruckt auf umweltfreundlichem, chlorfrei gebleichtem Papier Printed in Germany ISBN 978-3-451-29815-8 Inhalt Einleitung.......................................................................................... 9 1. Studieren in der Informations-und Mediengesellschaft .................. 17 1.1 Neue Medien und neue Kommunikationswege .................... 17 1.2 Der Computer als Hilfsmittel ............................................... 18 1.3 Das Internet als Informationsquelle....................................... 19 1.4 Orientierung im Internet - die Suchmaschinen als Wege zur Erstinformation...................................................................... 20 1.5 Orientierung im Internet - Flüchtigkeit und Dauer des Mediums................................................................................ 23 1.6 Das Problem
    [Show full text]
  • A Baker's Dozen of Tips for Better Web Searches
    University of Georgia School of Law Digital Commons @ Georgia Law Continuing Legal Education Presentations February 20, 2020 Feb 20th, 3:35 PM - 4:30 PM A Baker's Dozen of Tips for Better Web Searches Anne Burnett University of Georgia School of Law, [email protected] Follow this and additional works at: https://digitalcommons.law.uga.edu/cle Part of the Information Literacy Commons, Law Librarianship Commons, Legal Profession Commons, and the Legal Writing and Research Commons Burnett, Anne, "A Baker's Dozen of Tips for Better Web Searches" (2020). Continuing Legal Education Presentations. 7. https://digitalcommons.law.uga.edu/cle/2020/Schedule/7 This Event is brought to you for free and open access by the Alexander Campbell King Law Library at Digital Commons @ Georgia Law. It has been accepted for inclusion in Continuing Legal Education Presentations by an authorized administrator of Digital Commons @ Georgia Law. Please share how you have benefited from this access For more information, please contact [email protected]. A Baker’s Dozen of Tips for Better Web Searches Anne Burnett, J.D., M.L.I.S. University of Georgia Law Library Athens, Georgia A Baker’s Dozen of Tips for Better Web Searches Anne Burnett, J.D., M.L.I.S. University of Georgia Law Library Athens, Georgia TABLE OF CONTENTS Contents I. Introduction....................................................................................................................................... 1 II. The Tips ...........................................................................................................................................
    [Show full text]