{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:05:48Z","timestamp":1775282748891,"version":"3.50.1"},"reference-count":28,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2007,8,14]],"date-time":"2007-08-14T00:00:00Z","timestamp":1187049600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8,14]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this article is to explore the capabilities and limitations of weblog search engines.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The features of a range of current blog search engines are described. These are then discussed and illustrated with examples that illustrate the reliability and coverage limitations of blog searching.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Although blog searching is a useful new technique, the results are sensitive to the choice of search engine, the parameters used and the date of the search. The quantity of spam also varies by search engine and search type.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The results illustrate blog search evaluation methods and do not use a full\u2010scale scientific experiment.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Blog searching is a new technique, and one that is significantly different from web searching. Hence information professionals need to understand its strengths and weaknesses.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520710780421","type":"journal-article","created":{"date-parts":[[2007,8,18]],"date-time":"2007-08-18T07:02:01Z","timestamp":1187420521000},"page":"467-479","source":"Crossref","is-referenced-by-count":32,"title":["Blog search engines"],"prefix":"10.1108","volume":"31","author":[{"given":"Mike","family":"Thelwall","sequence":"first","affiliation":[]},{"given":"Laura","family":"Hasler","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012620181213800_b1","unstructured":"Bar\u2010Ilan, J. (1999), \u201cSearch engine results over time: a case study on search engine stability\u201d, available at: www.cindoc.csic.es\/cybermetrics\/articles\/v2i1p1.html (accessed January 26, 2006)."},{"key":"key2022012620181213800_b2","doi-asserted-by":"crossref","unstructured":"Bar\u2010Ilan, J. (2005), \u201cInformation hub blogs\u201d, Journal of Information Science, Vol. 31 No. 4, pp. 297\u2010307.","DOI":"10.1177\/0165551505054175"},{"key":"key2022012620181213800_b3","doi-asserted-by":"crossref","unstructured":"Bar\u2010Ilan, J. and Peritz, B. (2004), \u201cEvolution, continuity, and disappearance of documents on a specific topic on the web: a longitudinal study of \u2018informetrics\u2019\u201d, Journal of the American Society for Information Science and Technology, Vol. 55 No. 11, pp. 980\u201090.","DOI":"10.1002\/asi.20049"},{"key":"key2022012620181213800_b4","unstructured":"Bradley, P. (2003), \u201cSearch engines: weblog search engines\u201d, Ariadne, Vol. 36, available at: www.ariadne.ac.uk\/issue36\/search\u2010engines\/."},{"key":"key2022012620181213800_b5","doi-asserted-by":"crossref","unstructured":"Brin, S. and Page, L. (1998), \u201cThe anatomy of a large scale hypertextual web search engine\u201d, Computer Networks and ISDN Systems, Vol. 30 Nos 1\u20107, pp. 107\u201017.","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"key2022012620181213800_b6","unstructured":"Chakrabarti, S. (2003), Mining the Web: Analysis of Hypertext and Semi Structured Data, Morgan Kaufmann, New York, NY."},{"key":"key2022012620181213800_b7","doi-asserted-by":"crossref","unstructured":"Chowdhury, S. and Landoni, M. (2006), \u201cNews aggregator services: user expectations and experience\u201d, Online Information Review, Vol. 30 No. 2, pp. 100\u201015.","DOI":"10.1108\/14684520610659157"},{"key":"key2022012620181213800_b8","unstructured":"Curling, C. (2001), \u201cA closer look at weblogs\u201d, available at: www.llrx.com\/columns\/notes46.htm."},{"key":"key2022012620181213800_b9","doi-asserted-by":"crossref","unstructured":"Gamon, M., Aue, A., Corston\u2010Oliver, S. and Ringger, E. (2005), \u201cPulse: mining customer opinions from free text (IDA 2005)\u201d, Lecture Notes in Computer Science, No. 3646, pp. 121\u201032.","DOI":"10.1007\/11552253_12"},{"key":"key2022012620181213800_b10","unstructured":"Glance, N.S., Hurst, M. and Tomokiyo, T. (2004), \u201cBlogPulse: automated trend discovery for weblogs\u201d, available from: www.blogpulse.com\/papers\/www2004glance.pdf."},{"key":"key2022012620181213800_b11","doi-asserted-by":"crossref","unstructured":"Gruhl, D., Guha, R., Liben\u2010Nowell, D. and Tomkins, A. (2004), \u201cInformation diffusion through blogspace\u201d, paper presented at the WWW2004, New York, NY, available at: www.www2004.org\/proceedings\/docs\/1p491.pdf.","DOI":"10.1145\/988672.988739"},{"key":"key2022012620181213800_b12","doi-asserted-by":"crossref","unstructured":"Gruhl, D., Guha, R., Kumar, R., Novak, J. and Tomkins, A. (2005), \u201cThe predictive power of online chatter\u201d, in KDD '05: Proceeding of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, New York, NY, USA, ACM Press, New York, NY, pp. 78\u201087.","DOI":"10.1145\/1081870.1081883"},{"key":"key2022012620181213800_b13","unstructured":"Hammersley, B. (2005), Developing Feeds with RSS and Atom, O'Reilly, Sebastopol, CA."},{"key":"key2022012620181213800_b14","unstructured":"Han, S., Ahn, Y., Moon, S. and Jeong, H. (2006), \u201cCollaborative blog spam filtering using adaptive percolation search\u201d, WWW2006 Workshop, available at: www.blogpulse.com\/www2006\u2010workshop\/papers\/collaborative\u2010blogspam\u2010filtering.pdf (accessed 5 May, 2006)."},{"key":"key2022012620181213800_b15","doi-asserted-by":"crossref","unstructured":"Herring, S., Scheidt, L., Bonus, S. and Wright, E. (2004), \u201cBridging the gap: a genre analysis of weblogs\u201d, in Proceedings of the Thirty\u2010seventh Hawaii International Conference on System Sciences (HICSS\u201037), IEEE Press, Los Alamitos, CA.","DOI":"10.1109\/HICSS.2004.1265271"},{"key":"key2022012620181213800_b16","doi-asserted-by":"crossref","unstructured":"Jacso, P. (2005), \u201cVisualizing overlap and rank differences among world\u2010wide search engines: some free tools and services\u201d, Online Information Review, Vol. 29 No. 5, pp. 554\u201060.","DOI":"10.1108\/14684520510628927"},{"key":"key2022012620181213800_b17","doi-asserted-by":"crossref","unstructured":"Jacso, P. (2006), \u201cDubious hit counts and cuckoo's eggs\u201d, Online Information Review, Vol. 30 No. 2, pp. 188\u201093.","DOI":"10.1108\/14684520610659201"},{"key":"key2022012620181213800_b18","doi-asserted-by":"crossref","unstructured":"Lawrence, S. and Giles, C. (1999), \u201cAccessibility of information on the web\u201d, Nature, Vol. 400, pp. 107\u20109.","DOI":"10.1038\/21987"},{"key":"key2022012620181213800_b19","doi-asserted-by":"crossref","unstructured":"Lewandowski, D., Wahlig, H. and Meyer\u2010Bautor, G. (2006), \u201cThe freshness of web search engine databases\u201d, Journal of Information Science, Vol. 32 No. 2, pp. 131\u201048.","DOI":"10.1177\/0165551506062326"},{"key":"key2022012620181213800_b20","unstructured":"Lin, J. and Halavais, A. (2004), \u201cMapping the blogosphere in America\u201d, paper presented at the WWW 2004 Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics, New York, NY, 18 May."},{"key":"key2022012620181213800_b21","doi-asserted-by":"crossref","unstructured":"Mettrop, W. and Nieuwenhuysen, P. (2001), \u201cInternet search engines \u2013 fluctuations in document accessibility\u201d, Journal of Documentation, Vol. 57 No. 5, pp. 623\u201051.","DOI":"10.1108\/EUM0000000007096"},{"key":"key2022012620181213800_b22","unstructured":"Narisawa, K., Yamada, Y., Ikeda, D. and Takeda, M. (2006), \u201cDetecting blog spams using the vocabulary size of all substrings in their copies\u201d, WWW2006 Blog Workshop, available at: www.blogpulse.com\/www2006\u2010workshop\/papers\/detecting\u2010blog\u2010spam.pdf (accessed 5 May, 2006)."},{"key":"key2022012620181213800_b23","unstructured":"Notess, G. (2002), \u201cThe blog realm: news sources, searching with daypop, and content management\u201d, Online, Vol. 26 No. 5, pp. 70\u20102."},{"key":"key2022012620181213800_b24","unstructured":"Pikas, C. (2005), \u201cBlog searching for competitive intelligence, brand image, and reputation management\u201d, Online, Vol. 29 No. 4, pp. 16\u201021."},{"key":"key2022012620181213800_b25","unstructured":"Rousseau, R. (1999), \u201cDaily time series of common single word searches in AltaVista and NorthernLight\u201d, Cybermetrics, Vol. 2 No. 3, available at: www.cindoc.csic.es\/cybermetrics\/articles\/v2002i2001p2002.html (accessed 25 July, 2006)."},{"key":"key2022012620181213800_b26","doi-asserted-by":"crossref","unstructured":"Thelwall, M. (2007), \u201cBlog searching: the first general\u2010purpose source of retrospective public opinion in the social sciences?\u201d, Online Information Review, Vol. 31 No. 3, pp. 277\u201089.","DOI":"10.1108\/14684520710764069"},{"key":"key2022012620181213800_b27","doi-asserted-by":"crossref","unstructured":"Trammell, K. and Keshelashvili, A. (2005), \u201cExamining new influencers: a self\u2010presentation study of A\u2010list blogs\u201d, Journalism and Mass Communication Quarterly, Vol. 82 No. 4, pp. 968\u201082.","DOI":"10.1177\/107769900508200413"},{"key":"key2022012620181213800_b28","doi-asserted-by":"crossref","unstructured":"Weiss, A. (2004), \u201cYour blog? Who gives a @*#%!\u201d, netWorker, Vol. 8 No. 1, pp. 38\u201040.","DOI":"10.1145\/982773.982789"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520710780421","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710780421\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710780421\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:50Z","timestamp":1753404050000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/31\/4\/467-479\/315515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,14]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,8,14]]}},"alternative-id":["10.1108\/14684520710780421"],"URL":"https:\/\/doi.org\/10.1108\/14684520710780421","relation":{},"ISSN":["1468-4527"],"issn-type":[{"value":"1468-4527","type":"print"}],"subject":[],"published":{"date-parts":[[2007,8,14]]}}}