Category «United States Law»

Pete Recommends – Weekly highlights on cyber security issues October 14 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Consumer genetic testing that it’s now possible for law enforcement agencies to use genetic data to hunt down virtually anyone of European descent; FBI chief says threats from drones to U.S. ‘steadily escalating’; and Voice Phishing Scams Are Getting More Clever.

Subjects: Cybersecurity, E-Government, Government Resources, Privacy, RSS Newsfeeds, Terrorism

Pete Recommends – Weekly highlights on cyber security issues September 29 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Be careful about what you post on social media [really]; Overruling Constitutional Precedents; and If Your Data is Found on the Dark Web, Firefox Monitor Will Let You Know.

Subjects: Big Data, Civil Liberties, CRS Reports, Cybercrime, Government Resources, Health, KM, Privacy, Search Engines, Social Media, Supreme Court

Pete Recommends – Weekly highlights on cyber security issues September 22 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: 10 Investigative Tools You Probably Haven’t Heard Of; How to Safely Pay for Goods and Services With Someone You Don’t Know; and The Best Browsers of 2018: Chrome, Firefox, Edge, and More Tested.

Subjects: Cybercrime, Cybersecurity, Disaster Planning, Internet Resources, RSS Newsfeeds, Social Media, Travel

Text Analysis Systems Mine Workplace Emails to Measure Staff Sentiments

Giving the processes of observation, analysis and change at the enterprise level a modern spin, is a fascinating new article in the September 2018 issue of The Atlantic, titled What Your Boss Could Learn by Reading the Whole Company’s Emails, by Frank Partnoy. Alan Rothmam summarizes and annotates this article that raises timely and significant issues around privacy, data mining and organizational management. Rothman concludes his review by posing important questions concerning the impact of text analysis data on executive training and development and on employee performance.

Subjects: AI, Data Mining, Email, Employment Law, KM, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues September 15 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Verizon data breach digest lifts the lid on theft tactics; Samsung SmartThings Tracker Locates People, Pets, and Things; and Who controls your data?

Subjects: Big Data, Cybercrime, Cyberlaw, Cybersecurity, Government Resources, Privacy

Pete Recommends – Weekly highlights on cyber security issues September 8 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Effort to undermine American democracy/US Elections “has not stopped,” former Facebook security chief says; How to Use Google Privacy Settings – and – U.S .accuses China of ‘super aggressive’ spy campaign on LinkedIn.

Subjects: Civil Liberties, Cybersecurity, Economy, Intellectual Property, Privacy, Search Engines, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues September 1 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlights of this week’s column: Woman Sues Border Agents to Make Them Return Data They Seized From Her Phone – and How Yahoo Is Mining For Gold in Your Junk Mail.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Data Mining, E-Commerce, Email, Government Resources, Privacy

Pete Recommends – Weekly highlights on cyber security issues August 26 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlight of this week’s column: Doorbell camera videos create dilemma for police, neighborhoods – and Government Leads Industry in Anti-Spoofing Email Protection, Report Finds.

Subjects: Cybercrime, Email, Email Security, Firewalls, Gadgets, Privacy

Library Acquisition Patterns: Preliminary Findings

Katherine Daniel, Joseph J. Esposito, Roger C. Schonfeld: Several years ago, we set out to better understand how both library acquisition practices and the distribution patterns of publishers and vendors were evolving over time. Within the academic publishing community, there is a sense that academic libraries are acquiring fewer and fewer books and that university presses are struggling amid declining sales. The latter may certainly be true—a recent UK study found that between 2005 and 2014, retail sales of academic books dropped by 13 percent—but what if the academic libraries that constitute part of that market were in reality not making fewer purchases? As new vendors and acquisition methods disrupt customary means of acquiring books, Joseph Esposito, Ithaka S+R’s frequent collaborator and consultant, was inspired to ask whether book sales were actually depressed, or if they only appeared to be because academic libraries were bypassing the traditional wholesale vendors whose metrics are used by university presses to assess sales to libraries for companies like Amazon.

Subjects: E-Commerce, Electronic Subscriptions, Information Management, Libraries & Librarians, Reference Resources

Pete Recommends – Weekly highlights on cyber security issues August 18 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlight of this week’s column: AP Exclusive: Google tracks your movements, like it or not; and Hackers can steal data from the enterprise using only a fax number. Although many assume fax machines are no longer in general use, think about your doctors and hospitals – they all continue to use them, as do many states, localities, the federal government, and courts.

Subjects: Congress, Cybercrime, Cybersecurity, Privacy, Search Engines