Category «KM»

Internet Archive Open Library lawsuit moves forward; arguments set for November 2021

Chris Meadows discusses the ongoing case by four publishers, Hachette Book Group, HarperCollins Publishers, John Wiley & Sons and Penguin Random House, against the Internet Archives Open Library respective to the scanning, public display, and distribution of entire literary works. As noted, this is “a potentially sensitive, and complex litigation.” The future of the Internet Archive may hang in the balance. This case is shining light on the heightened importance of evaluating fair use during a pandemic that is keeping vast books collections out of users reach for the unforeseeable future, while most education is confined to distance learning.

Subjects: Business Research, Competitive Intelligence, Distance Learning, Education, KM, Legal Research, Libraries & Librarians, Search Engines, Virtual Library

LLRX New Issue – August 2020

Articles and Columns for August 2020

  • Statistics Resources and Big Data on the Internet 2020 – This expansive listing by Marcus P. Zillman focuses on statistics and big data datasets available free on the internet, covering multiple disciplines, for teaching, learning and reference. These data are published and maintained by sources that include: the U.S. and foreign governments, academic, corporate, NGOs, and open source communities.
  • Mining Data on the Internet 2020 – Data mining is a constantly evolving discipline applied in many fields including finance, law, healthcare, marketing, science and engineering, the retail industry, telecommunications, social media, and government. This guide by Marcus P. Zillman encompasses free, fee based and consultancy related sources to assist info pros, researchers, data analysts, knowledge managers and CI/BI experts to effectively identify and apply reliable, value added data within the scope of their respective work products.
  • Why Steve Bannon faces fraud charges: 4 questions answered – Federal prosecutors in New York have arrested former senior Trump adviser Steve Bannon and three other men, and charged them with allegedly defrauding hundreds of thousands of donors to an online fundraising campaign to build portions of wall along the U.S. border with Mexico. Lloyd Hitoshi Mayer, a University of Notre Dame law professor who researches nonprofits, explains what’s going on and what the consequences could be.
  • Finding Email AddressesAcross most sectors, customer support is no longer provided by human contacts but rather leads customers into endless telephone loops of menus, or listening to chatbots, or receiving emails to “no-reply” addresses. Finding email addresses for actual people is very difficult but Michael Ravnitzky’s article features proven tools and techniques to locate and use the email address of individuals within organizations who should be responding to your issues and complaints and providing you with a satisfactory resolution.
  • Webinar Recap: How to Safeguard Your Law Firm Against Future Disruption – As the COVID-19 pandemic continues to surge in various parts of the country, you’re no doubt facing uncertainties on how and when to reopen your law firm. You’re also likely wondering about the future of your law firm and its book of business. One way to directly address these concerns is to prioritize preparing your firm for whatever may come. There’s no better time to ensure that you’re protected, and this free webinar and accompanying transcript by Nicole L. Black are excellent resources to help you mitigate an over abundance of challenges.
  • 5 ways KM teams are driving law firm business – Law Firm Research Manager Dean Mason shares his thoughts on how KM teams successfully drive law firm business using actionable-intelligence, business development, productivity, cost management and billing.
  • Pete Recommends – Weekly highlights on cyber security issues, August 29, 2020Four highlights from this week: How Smartphone Location Tracking Works, and What You Can Do About It; Deep Fakes and National Security; How Facebook and Other Sites Manipulate Your Privacy Choices; and Voice phishing attacks on the rise, CISA, FBI warn private sector.
  • Pete Recommends – Weekly highlights on cyber security issues, August 23, 2020Four highlights from this week: Instagram requires government ID to verify suspicious accounts; How to Clean Up Your Social Media Accounts Without Deleting Them; CBP Shifts to Enterprise Approach to Manage Phone Searches at U.S. Borders; and Amazon shares your private info unless you do these steps.
  • Pete Recommends – Weekly highlights on cyber security issues, August 15, 2020Four highlights from this week: DHS acting secretary, top deputy were appointed illegally; Strengthening Privacy Protections in COVID-19 Mobile Phone–Enhanced Surveillance Programs; U.S. Postal Service Counters Trump Attacks On Mail-In Voting With A New Blockchain Patent; and Data Security & Privacy Gaps in Video Doorbells.
  • Pete Recommends – Weekly highlights on cyber security issues, August 8, 2020Four highlights from this week: This Tool Could Protect Your Photos From Facial Recognition; NSA Releases Guidance on Limiting Location Data Exposure; Lawsuit claims TikTok steals kids’ data and sends it to China; and Data isn’t just being collected from your phone. It’s being used to score you.
  • Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

LLRX.com® – the free web journal on law, technology, knowledge discovery and research for Librarians, Lawyers, Researchers, Academics, and Journalists. Founded in 1996.

Subjects: KM

Mining Data on the Internet 2020

Data mining is a constantly evolving discipline applied in many fields including finance, law, healthcare, marketing, science and engineering, the retail industry, telecommunications, social media, and government. This guide by Marcus P. Zillman encompasses free, fee based and consultancy related sources to assist info pros, researchers, data analysts, knowledge managers and CI/BI experts to effectively identify, analyze and apply reliable, value added data within the scope of their respective work products.

Subjects: AI, Business Research, Competitive Intelligence, Data Mining, Economy, Financial System, Internet Resources, KM, Legal Research, Open Source

Pete Recommends – Weekly highlights on cyber security issues, August 29, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Smartphone Location Tracking Works, and What You Can Do About It; Deep Fakes and National Security; How Facebook and Other Sites Manipulate Your Privacy Choices; and Voice phishing attacks on the rise, CISA, FBI warn private sector.

Subjects: AI, Civil Liberties, Cybercrime, Education, Email Security, Encryption, Gadgets/Gizmos, Health, KM, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 8, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Tool Could Protect Your Photos From Facial Recognition; NSA Releases Guidance on Limiting Location Data Exposure; Lawsuit claims TikTok steals kids’ data and sends it to China; and Data isn’t just being collected from your phone. It’s being used to score you.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Email, Email Security, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media

Student Research Resources 2020

This timely and extensive guide by Marcus Zillman includes resources for students, teachers and parents who together begin this school year with most, or in many cases, all of their courses conducted via online distance learning. The guide includes a wide range of links to augment and expand your current toolkit, including: open textbooks and learning resources for all subjects; free online courses; tutorial resources; educational search engines; video lectures and talks; tools to capture and organize ideas; comparing prices on new an used textbooks; and strategies for organizing notes for comprehensive exams.

Subjects: Distance Learning, Education, Internet Resources - Web Links, KM, Open Source, Reference Resources, Search Engines, Search Strategies, Technology Trends

LLRX New Issue – July 2020

Articles and Columns for July 2020 Student Research Resources 2020 – This timely and extensive guide by Marcus Zillman includes resources for students, teachers and parents who together begin this school year with most, or in many cases, all of their courses conducted via online distance learning. The guide includes a wide range of links to …

Subjects: KM

Private browsing: What it does – and doesn’t do – to shield you from prying eyes on the web

Prof. Lorrie Cranor, Carnegie Mellon University and Hana Habib, Graduate Research Assistant at the Institute for Software Research, Carnegie Mellon University, highlight their research on how many people who use private browsing have misconceptions about what protection they’re gaining. A common misconception is that these browser modes allow you to browse the web anonymously, surfing the web without websites identifying you and without your internet service provider or your employer knowing what websites you visit. The tools actually provide much more limited protections.

Subjects: Civil Liberties, Competitive Intelligence, Internet Trends, KM, Legal Research, Online Legal Research Services, Privacy, Search Engines, Search Strategies, Social Media, Spyware