Search Engine Lists

This is part of our new guide on achieving ‘knowledge advantage’ in the information age….
Search engine lists are important resources. While half a dozen key ones are listed below, be aware of all sites that have collected URLs to multiple search engines. They can be time-savers when you want to find and use that “special resource.” Using search engine lists afford the researcher a vast choice of search tools. These include:


Our entire book is available from Booklocker, Barnes & Noble, Amazon, and other major bookstores.



What You Don’t Know…. Links from Our Book


We will be posting information and links from The Research School’s new book, What You Don’t Know… Your Guide to Achieving Knowledge in the Information Age!


Researchers, in fact all who go online, need to protect themselves from snoopers – and worse. An important initial step to protecting yourself, family and those you work with is to use a privacy-aware search engine. Four that may be useful in protecting you include:


Once you are logged into LinkedIn, you can change your setting by going up to the ‘Me’ menu at the top, and selecting ‘Settings and Privacy’:

This will open up another tab.  Go to the ‘Privacy’ tab:

A couple of items to pay close attention to in here: 1) If you are not interested in the public seeing your profile, you can limit this through the ‘Edit your public profile’ page.  There are many items that you can tweak here as well as limit your full profile to only your connections.

2)  You can also limit what others see when you look at their profile through the ‘Profile viewing options’.  This allows you to look at other’s profiles anonymously if you wish.  The last item of note is this page is also where you can set Two-step verification to better protect your account.

Privacy settings on Twitter

Twitter has a great help page that shows you how to customize your Twitter experience.

Once here, go to ‘The Basics’ menu on the left side of the page and click on ‘Customizing your experience’:

It is helpful to go through each of these menus to understand the differences between protected and unprotected tweets, as well as how to be able to approve your followers.  Another helpful page is their Safety & Security tips:

Pay special attention to the ‘Protecting your personal information’ page as it has detailed steps about how to protect your personal information in your account, how to have your personal information removed if someone else posts it and keeping your account secure.  One particular page to note is how to turn off tagging for pictures that you post:

This will help ensure that information tied to your photos is not inadvertently made public.