Category «Communications»

Don’t be too quick to blame social media for America’s polarization – cable news has a bigger effect, study finds

Homa Hosseinmardi and a group of researchers from Stanford University, the University of Pennsylvania and Microsoft Research tracked the TV news consumption habits of tens of thousands of American adults each month from 2016 through 2019. They discovered four aspects of news consumption that, when taken together, paint an unsettling picture of the TV news ecosystem.

Subjects: Communications, Internet Trends, KM, Social Media

Presenter’s Guide Series, Part II – Dealing With Difficult Questions

Attorney Jerry Lawson is a legal tech expert with decades of experience delivering effective presentations. In this, the second part of a multi part series, Lawson shares insightful recommendations and techniques to successfully manage what can be challenging interactions with audience members during the course of a presentation.

Subjects: Communication Skills, Communications, Continuing Legal Education, Education, Presentation Skills, Training

Pete Recommends – Weekly highlights on cyber security issues, May 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Cyber security 101: Protect your privacy from hackers, spies, and the government; Inside the Government Fiasco That Nearly Closed the U.S. Air System; My Instagram account was hacked and two-factor authentication didn’t help; Serious Warning Issued For Millions Of Google Gmail Users; and Report: Russian Botnet Can Spam Social Media on ‘Massive Scale’.

Subjects: Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, E-Government, Economy, KM, Privacy, Social Media, Technology Trends, Travel

The Practice of People Law

Jim Calloway is the Director of the Oklahoma Bar Association’s Management Assistance Program. He informs us about the range of legal services delivered by what have been designated as “primary-care lawyers.” From Calloway’s perspective, there is people law, and there is business/corporate law. Over the years, there has been a greater divergence in these two types of law practice focuses. He makes the case that increasingly, these are completely different types of law practices, with different types of challenges and processes. Calloway believes this is not only true but profound. He views it as profound because consideration of the differences should inform and impact the method of legal service delivery depending on the type of client.

Subjects: Communications, Education, KM, Law Firm Marketing, Legal Marketing, Legal Profession, Management

Pete Recommends – Weekly highlights on cyber security issues, April 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Amazon Workers Can Now Keep Cell Phones at Work; Best Reverse Image Search Tool: Google, Bing, Pixsy, Tineye; Google adds more ways to remove yourself from Search results; and Shut Stalkers Out of Your Tech.

Subjects: Blockchain, Civil Liberties, Communications, Cybersecurity, Economy, Privacy, Reference Resources, Search Engines, Search Strategies

Propaganda, Mis- and Disinformation, and Censorship: The War for Hearts and Minds

Author and blogger Dave Pollard addresses the incendiary global war of lies vs. truth, reminiscent of the MAD Magazine cartoon Spy Vs. Spy for those who of us who can recall the scenarios they played which remain eerily prescient. Pollard posits the most effective way to win and retain political power is by seizing the hearts and minds of citizens through a mix of propaganda, mis- and disinformation, and censorship. He continues, this is especially true now, living with a ubiquitous and unceasing firehose of often-conflicting information, and exploitative for-profit “social” media controlled by a handful of dimwitted and unstable western oligarchs.

Subjects: Communications, Competitive Intelligence, Ethics, Free Speech, Information Management, KM, News Resources, Social Media

The intentional law office

Legal sector analyst Jordan Furlong writes that it’s taken two years of rolling pandemic lockdowns to shake us from our torpid habit of gathering together only to work alone. Over the next decade, a Stanford professor estimates, US workers will spend a quarter of their work time at home — “the number of person-days in the office is never going back to pre-pandemic average, ever.” This has obvious ramifications for corporate office space, employee well-being, and even climate change. But the workplace itself is ground zero for this change, and there will be enormous ramifications in this regard alone. Furlong’s thought provoking essay identifies critical choices that can be made that will result in better outcomes for law firms moving forward.

Subjects: Communications, KM, Law Firm Marketing, Leadership, Management, Telecommuting

The Russian invasion shows how digital technologies have become involved in all aspects of war

Since Russia invaded Ukraine, we keep hearing that this war is like no other; because Ukrainians have cellphones and access to social media platforms, the traditional control of information and propaganda cannot work and people are able to see through the fog of war. For these communications scholars and historians, Professors Katharina Niemeyer, Dominique Trudel, Heidi J. S. Tworek, Maria Silina and Svitlana Matviyenko, it is important to add nuance to such claims. The question is not so much what is “new” in this war, but rather to understand its specific media dynamics. One important facet of this war is the interplay between old and new media — the many loops that go from Twitter to television to TikTok, and back and forth.

Subjects: AI, Communications, KM, Social Media, Technology Trends

2022 Guide to Internet Privacy Resources and Tools

The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.

Subjects: AI, Big Data, Blockchain, Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Encryption, Financial System, Legal Research, Legal Technology, Search Engines, Search Strategies, Software

Pete Recommends Weekly highlights on cyber security issues, January 29, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: How ID.me’s Face Recognition for IRS, Unemployment Works; A Former Hacker’s Guide to Boosting Your Online Security; White House clamps down on federal cybersecurity after big hacks; How to Download Everything Amazon Knows About You (It’s a Lot); and Teamwork, trust and threat sharing key to cybersecurity.

Subjects: AI, Communications, Cybercrime, Cybersecurity, Data Mining, E-Commerce, Ethics, Free Speech, Freedom of Information, Government Resources, KM, Legal Research, Privacy, Search Engines, Social Media, Telecommuting