Category «Big Data»

2020 KM + Innovation Survey Results

Ron Friedman’s extensively documented article reports on the survey to support the 2020 Strategic Knowledge + Innovation Legal Leaders’ Summit, which took place in early February 2020. The Summit is a meeting of about 65 senior knowledge management professionals from large US, UK, and Canadian law firms. The depth and breath of actionable information and data shared in this article makes it a critical read for law firm and corporate KM and Innovation professionals.

Subjects: AI, Big Data, Case Management, Communication Skills, Communications, Contact Management, Data Mining, Digital Archives, Information Architecture, Information Mapping, KM, Leadership, Legal Marketing, Legal Technology, Management, Presentation Skills, Team Building

Pete Recommends – Weekly highlights on cyber security issues February 22, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: A spotter’s guide to the groups that are out to get you; The ‘Robo Revenge’ App Makes It Easy to Sue Robocallers; Activate This ‘Bracelet of Silence,’ and Alexa Can’t Eavesdrop; and Security experts raise concerns about voting app used by military.

Subjects: Big Data, Cybercrime, Cybersecurity, E-Commerce, Election Law, Healthcare, Privacy

Pete Recommends – Weekly highlights on cyber security issues February 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 2019 Internet Crime Report Released; The silent threat of the coronavirus: America’s dependence on Chinese pharmaceuticals; Equifax breach: How Chinese army hackers allegedly stole personal info; and How to Share Files Securely Online: Dropbox, Firefox Send, and More.

Subjects: AI, Big Data, Civil Liberties, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Data Mining, Economy, Education, Financial System, Government Resources, Health, Internet Trends, Privacy

Pete Recommends – Weekly highlights on cyber security issues January 18, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Inspector General Warns Public About New Twist To Social Security Phone Scams; SEC’s Office of Investor Education and Advocacy is issuing this alert to urge investors to use caution before investing in so-called “initial exchange offerings” through online trading platforms; NSA Takes Step Toward Protecting World’s Computers, Not Just Hacking Them; and A Billion Medical Images Are Exposed Online As Doctors Ignore Warnings.

Subjects: Big Data, Blockchain, Cybercrime, Cybersecurity, E-Commerce, Email, Email Security, Health, Healthcare, Privacy

Converging Paths: A Librarian’s Journey to Becoming a Privacy Professional

After receiving her MLIS Stephanie Davis worked in the field of knowledge management (KM) where she sourced, documented, categorized, and shared information about her consulting firm’s people and project experiences. Davis designed webpages, delivered training programs on information access and disclosure, and administered communications and awareness campaigns. She also tracked metrics and presented reports to senior management to demonstrate the KM program was delivering against our strategy and mandate. Davis became interested in keeping data secure and maintaining confidentiality while also focusing on how to make information as accessible as possible so her clients could achieve their objectives – and this article discusses her role as a privacy professional.

Subjects: Big Data, Computer Security, Cybercrime, Cybersecurity, KM, Law Librarians, Leadership, Libraries & Librarians, Privacy

Pete Recommends – Weekly highlights on cyber security issues December 14, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Verizon kills email accounts of archivists trying to save Yahoo Groups history; Ransomware: Cybercriminals are adding a new twist to their demands; 988 will be the new 911 for suicide prevention—by sometime in 2021; Ring’s Hidden Data Let Us Map Amazon’s Sprawling Home Surveillance Network.

Subjects: Big Data, Cybercrime, Cybersecurity, Gadgets/Gizmos, Health, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 7, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 50 countries ranked by how they’re collecting biometric data and what they’re doing with it; Facebook Asks Supreme Court to Review Face Scan Decision; The United States House Has Approved a New Anti-Robocall Bill; and Do our algorithms have enough oversight?.

Subjects: AI, Big Data, Communications Law, Congress, Cybercrime, Cybersecurity, Government Resources, KM, Legal Research, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues November 30, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Go Google free: We pick privacy-friendly alternatives to every Google service; Alexa, Siri and other voice systems are raising security worries; Canada’s use of Huawei 5G would hamper its access to U.S. intelligence – U.S. official; Law enforcement can plunder DNA profile database, judge rules.

Subjects: Big Data, Civil Liberties, Cybercrime, Cybersecurity, Social Media

2020 Guide to Web Data Extractors

This guide by Marcus P. Zillman is a comprehensive listing of web data extractors, screen, web scraping and crawling sources and sites for the Internet and the Deep Web. These sources are useful for professionals who focus on competitive intelligence, business intelligence and analysis, knowledge management and research that requires collecting, reviewing, monitoring and tracking data, metadata and text.

Subjects: AI, Big Data, KM, Search Engines, Search Strategies, Social Media

Pete Recommends – Weekly highlights on cyber security issues November 23, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Stop Using Public USB Ports to Charge Your Phone; Upgrading Your Phone? 4 Things You Should Do First; Who Stole My Face? The Risks Of Law Enforcement Use Of Facial Recognition Software; and How to Lock Down Your Health and Fitness Data.

Subjects: AI, Big Data, Congress, Cybercrime, Cybersecurity, Healthcare, Legislative, Mobile Tech, Pornography, Privacy, Search Engines