Year archives: 2019

Manage Information Overload Resources 2019

As we are challenged each day to expertly respond to an overwhelming amount of information, much of it not relevant to our requirements, it is a major undertaking to exercise our choices skillfully as well as to balance our knowledge resources to best serve our objectives. Marcus Zillman’s guide offers both broader resources on how to manage information overload, as well as sources, tools and techniques to facilitate research productivity.

Subjects: Internet Resources, Internet Resources - Web Links, KM, Legal Research, Technology Trends

Is it a “Good” Case? Can You Rely on BCite, KeyCite, and Shepard’s to Tell You?

Kristina L. Niedringhaus calls our attention to a recent article by Paul Heller whose research identified 357 citing relationships that one or more of the three major citators labeled as negative. “Out of these, all three citators agree that there was negative treatment only 53 times. This means that in 85% of these citing relationships, the three citators do not agree on whether there was negative treatment.”

Subjects: Citators, KM, Legal Research, Legal Research Training, Product Reviews, United States Law

Pete Recommends – Weekly highlights on cyber security issues April 28, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: ‘They think they are above the law’: the firms that own America’s voting system; Why You Should Use a Password Manager; Cyberspies Hijacked the Internet Domains of Entire Countries; and Huawei: Chinese spies or trustworthy 5G industry partner?

Subjects: Cybersecurity, Mobile Technology, Privacy, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues April 20, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: WikiLeaks set 21st century model for cyber-leak journalism; Your car is watching you. Who owns the data?; Facebook, lose my digits: Here’s how to unlist your phone number; and What e-books at the library mean for your privacy.

Subjects: Cybercrime, Cybersecurity, E-Books, Health, Internet Trends, KM, Libraries & Librarians, Privacy, Social Media

Legal Research: Resources for Reviewing Employment Policies on Harassment

This timely guide by Genevieve Zook, reference & instructional services librarian at the U.W. Law Library, addresses the significant issue of sexual harassment in the workplace. Employers are increasingly reviewing sexual harassment policies and procedures in their organizations, and Zook’s comprehensive guide is an actionable resource with which to effectively engage and implement positive change.

Subjects: Civil Liberties, Education, Internet Resources, Legal Research, Online Legal Research Services, Reference Resources, Search Strategies

Opinion – How a national library endowment could help Philadelphia

David Rothman continues his advocacy for a national library endowment to help K-12 and public libraries in Philadelphia, and around the country. His argument in favor of such an endowment is especially resonant in light of the recent college entrance cheating and bribery scams involving the children of wealthy parents and celebrities.

Subjects: Economy, Education, Libraries & Librarians, Reference Services

Pete Recommends – Weekly highlights on cyber security issues April 13, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Eyes on the Road! (Your Car Is Watching); New privacy assistant Jumbo fixes your Facebook & Twitter settings; UK to introduce world first online safety laws; and The Robocall Crisis Will Never Be Totally Fixed.

Subjects: Cybercrime, Cybersecurity, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues April 6, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Make Sure You’re Aware Of These Safety Tips When Using Uber And Lyft; Researchers Demonstrate Malware That Can Trick Doctors Into Misdiagnosing Cancer; Silicon Valley is Fighting a New Kind of Identity Fraud; and Popup enlarges at the last second so users click on ads instead of ‘Close’ button.

Subjects: Cybercrime, Cybersecurity, Healthcare, Travel

Knowledge Modeling

Taxonomist Heather Hedden compares and contrasts the work of creating a taxonomy to that of creating a knowledge model, which also involve inputs of people and content, but where more emphasis is on stakeholder/user input. As Hedden says, “content contains information, but people contain knowledge, so knowledge modeling requires the input of various people, with the input gathered in a comprehensive and systematic way.” This article clearly identifies more facets of the role of knowledge management within organizations in many sectors.

Subjects: Information Management, KM