Category «AI»

Pete Recommends – Weekly highlights on cyber security issues, March 21, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Please Stop Using Text Messaging to Receive Login Codes; How to poison the data that Big Tech uses to surveil you; Ulysses Group Claims It Can Track Nearly Any Car in Real-Time; and Google Can Be Sued for Tracking Users in Private Browsing Mode.

Subjects: AI, Big Data, Cybercrime, Cyberlaw, Cybersecurity, Data Mining, Healthcare, Legal Research, Legislative, Privacy, Spyware, Technology Trends

It’s not just a social media problem – how search engines spread misinformation

Chirag Shah, Associate Professor in the Information School, University of Washington and Founding Director of InfoSeeking Lab, which focuses on issues related to information seeking, human-computer interaction (HCI), and social media. Shah’s research describes how search engines are not just one of society’s primary gateways to information and people, but they are also conduits for misinformation. Similar to problematic social media algorithms, search engines learn to serve you what you and others have clicked on before. Because people are drawn to the sensational, this dance between algorithms and human nature can foster the spread of misinformation.

Subjects: AI, Internet Trends, KM, Search Engines, Search Strategies, Social Media

Pete Recommends – Weekly highlights on cyber security issues, February 27, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Algorithms That Curate Feeds & Tech Company Secrecy; Public Employees’ Use of Personal Phones, Tablets Puts Local Governments at Risk; How to Find Hidden Cameras Using Your Mobile Phone; and Why non-human workers can increase security issues in your business.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, Economy, Environmental Law, Financial System, Gadgets/Gizmos, Health, Healthcare, Privacy, Social Media

46,218 news transcripts show ideologically extreme politicians get more airtime

Professors Joshua Darr, Jeremey Padgett and Johanna Dunaway research how changes in the media have shifted the incentives of elected officials and the considerations of voters, and what that means for American democracy. In recent work, they showed that extremely conservative and extremely liberal legislators receive far more airtime on cable and broadcast news than their moderate counterparts.

Subjects: AI, Communications, Congress, KM, Legislative, Social Media

Pete Recommends – Weekly highlights on cyber security issues, February 13, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Paper – A First Look at Zoombombing; Google Chrome’s engineering director discusses how the company is trying to preserve digital advertising after tracking cookies are killed off; NSF pushing for agency-specific cyber-physical research; and They Stormed the Capitol. Their Apps Tracked Them.

Subjects: AI, Big Data, Congress, Cybersecurity, KM, Legal Research, Legislative, Privacy, Search Engines, Search Strategies, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, February 6, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 30% of ‘SolarWinds’ Victims Did Not Actually Use SolarWinds Software, Feds Say; Tough to Get Help Opting Out of Data Sharing; Police in Almost All U.S. States Use Amazon’s Ring Program; and Russian hack brings changes, uncertainty to U.S. court system.

Subjects: AI, Computer Security, Courts & Technology, Cybercrime, Cybersecurity, Government Resources, Legal Research, Legislative, Privacy

Online Research Browsers and Data Visualization Tools 2021

This guide by Marcus P. Zillman focuses on free and feed based research browsers and data visualization tools for research and analysis. These resources can be used to support legal research, legal marketing, business and competitive intelligence research, knowledge management and knowledge discovery, and data mining.

Subjects: AI, Big Data, Communications, Competitive Intelligence, Digital Archives, KM, Legal Marketing, Legal Research, Libraries & Librarians, Search Engines, Search Strategies, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, January 31, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Five highlights from this week: As U.S. Capitol investigators use facial recognition, it begs the question: Who owns our faces?; Fraudulent Applicants for Paycheck Protection Program (PPP) and a Surge in Criminal Referrals from Small Business Administration; U.S. Intelligence Claims China Wants to Steal Your DNA; Microsoft Deals Blow To Chrome With A Bunch Of Exciting New Edge Features; and Apple: Keep iPhone 12 and MagSafe Away From Medical Devices.

Subjects: AI, Big Data, Civil Liberties, Cybersecurity, Government Resources, Healthcare, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Keynote: AI Transformation – Competing in the Age of AI #KMWorld

Knowledge sharing, social media and knowledge management expert V. Mary Abraham shares her readout and impressions of this timely and impactful keynote presented by Marco Iansiti, Harvard Business School Professor of Business Administration, and Coauthor of Competing in the Age of AI. Abraham’s insights encompass how the pandemic is accelerating enormous changes. Within 5-10 years, every organization will be run differently. Those who invest in digital transformation will do just fine. Those who do implement tangible change not will be left behind.

Subjects: AI, Big Data, Communications, Information Architecture, KM, Management

As U.S. Capitol investigators use facial recognition, it begs the question: Who owns our faces?

In the age of Big Tech, we need to grapple with what expectations we can and should have about who has access to our faces. The recent riot at the U.S. Capitol has put the question into the spotlight as facial recognition becomes a vital tool in identifying rioters: What is the power of facial recognition technology, and are we ready for it? Professor Wendy H. Wong discusses what are the costs and consequences of losing our faces to data, including the right to privacy and our ability to live our lives free of surveillance.

Subjects: AI, Civil Liberties, KM, Legal Research, Privacy, Technology Trends