Category «E-Discovery»

Mining Data on the Internet 2020

Data mining is a constantly evolving discipline applied in many fields including finance, law, healthcare, marketing, science and engineering, the retail industry, telecommunications, social media, and government. This guide by Marcus P. Zillman encompasses free, fee based and consultancy related sources to assist info pros, researchers, data analysts, knowledge managers and CI/BI experts to effectively identify, analyze and apply reliable, value added data within the scope of their respective work products.

Subjects: AI, Business Research, Competitive Intelligence, Data Mining, Economy, Financial System, Internet Resources, KM, Legal Research, Open Source

Pete Recommends – Weekly highlights on cyber security issues February 29, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Will tech companies prevent misuse of platforms in 2020 election? Few in U.S. are confident; Privacy Concerns Raised Over New Google Chrome Feature; Clearview AI, Facial Recognition Company That Works With Law Enforcement, Says Entire Client List of Customers Was Stolen; Firefox enables network privacy feature for users in US.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Data Mining, E-Government, Government Resources, Health, Internet Resources - Web Links, Legal Research, Privacy, Search Engines, Search Strategies, Social Media, Technology Trends

2020 KM + Innovation Survey Results

Ron Friedman’s extensively documented article reports on the survey to support the 2020 Strategic Knowledge + Innovation Legal Leaders’ Summit, which took place in early February 2020. The Summit is a meeting of about 65 senior knowledge management professionals from large US, UK, and Canadian law firms. The depth and breath of actionable information and data shared in this article makes it a critical read for law firm and corporate KM and Innovation professionals.

Subjects: AI, Big Data, Case Management, Communication Skills, Communications, Contact Management, Data Mining, Digital Archives, Information Architecture, Information Mapping, KM, Leadership, Legal Marketing, Legal Technology, Management, Presentation Skills, Team Building

Pete Recommends – Weekly highlights on cyber security issues February 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 2019 Internet Crime Report Released; The silent threat of the coronavirus: America’s dependence on Chinese pharmaceuticals; Equifax breach: How Chinese army hackers allegedly stole personal info; and How to Share Files Securely Online: Dropbox, Firefox Send, and More.

Subjects: AI, Big Data, Civil Liberties, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Data Mining, Economy, Education, Financial System, Government Resources, Health, Internet Trends, Privacy

Pete Recommends – Weekly highlights on cyber security issues February 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Ring Doorbell App Packed with Third-Party Trackers; How Corporate Lawyers Made It Harder to Punish Companies That Destroy Electronic Evidence; Jeff Bezos Phone Hacking – WhatsApp Hack – Is WhatsApp Safe?; and 8 cities that have been crippled by cyberattacks — and what they did to fight them.

Subjects: Congress, Cybercrime, Cybersecurity, E-Discovery, Election Law, Email, Email Security, Encryption, Firewalls, Gadgets/Gizmos, Intellectual Property, Privacy

Long Tail. Fat Risk. Why You May Want to Rethink Your “Platform” Strategy. Right Now

Tech savant, innovator and prognosticator – Jason Voiovich: “How many times in #marketing, #innovation, and #product strategy do we find ourselves looking only at the upside? In our TAM calculations, how often do we subtract out the “negative market”​ to account for risks? I’ve been doing this for nearly 25 years, and I never did. I suspect you haven’t either. I’m not sure I would have seen this as an obvious next step had I not spent the last year exploring the dark side of #platform strategies from Amazon, Google, Facebook, and Twitter. It’s time to look at these business models holistically. “

Subjects: Big Data, Business Research, Competitive Intelligence, Data Mining, Economy, Information Management, KM, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues August 25, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google adding autocorrect to Gmail; You Can Finally See All Info Facebook Collected About You From Other Websites; Just Security Launches the Russia Investigation Congressional Clearinghouse; and In New Facebook Effort, Humans Will Help Curate Your News Stories.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Data Mining, Email, Government Resources, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues July 13, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Fake News Could Lead to Real War; Researchers detail privacy-related legal, ethical challenges with satellite data Firefox 68 arrives with darker reader view, recommended extensions, IT customizations; ICE, FBI use state driver’s license photos for facial-recognition scans; and Google tracks all Gmail account purchases, even if emails are deleted.

Subjects: Civil Liberties, Cybersecurity, Data Mining, E-Government, Email, Email Security, Privacy, Search Engines, Search Strategies, Social Media

Terms, Tags, and Classification

It is helpful to classify documents or other content items to make them easier to find later. Searching the full text alone can retrieve inaccurate results or miss appropriate documents containing different words from the words entered into a search box. A document or content management system may include features for tagging, keywords, categories, indexing, etc. Taxonomist Heather Hedden identifies the difference between these elements to facilitate the implementation of more effective knowledge and content management.

Subjects: Business Research, Case Management, Competitive Intelligence, E-Discovery, Information Architecture, Information Mapping, KM

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies