Category «KM»

Pete Recommends – Weekly highlights on cyber security issues, January 8, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Hidden Cost of Cheap TVs; Cloud email services bolster encryption against hackers; Did ChatGPT Write That? College Kid Creates AI Essay Detector; and the FBI’s Perspective on Ransomware.

Subjects: AI, Cybersecurity, Education, Email Security, Encryption, KM, Legal Research, Privacy, Spyware, Technology Trends

LLRX December 2022 Issue

Articles and Columns for December 2022 Inventing the Dark Web – This paper by Thais Sardá, Simone Natale, and John Downey examines how the deep Web, i.e., Web sites that are not indexed and thus are not accessible through Web search engines, was described and represented in British newspapers. Through an extensive content analysis conducted …

Subjects: KM

Inventing the Dark Web

This paper by Thais Sardá, Simone Natale and John Downey examines how the deep Web, i.e., Web sites that are not indexed and thus are not accessible through Web search engines, was described and represented in British newspapers. Through an extensive content analysis conducted on 833 articles about the deep Web published between 2001 and 2017 by six British newspapers, the authors demonstrate that these technologies were predominantly associated with crime, crypto markets and immoral content, while positive uses of this technology, such as protecting privacy and freedom of speech, were largely disregarded. The consistent association by the British press between the deep Web and criminal and antisocial behaviors is exemplary of a recent “apocalyptic turn” in the imaginary of the Web, whereby Web-related technologies are perceived and portrayed in more negative ways within the public sphere. The authors argue that the use of such negative concepts, definitions and associations engender distrust about uses of the deep Web, propagating user stereotypes that reflect what the authors argue to be an overall criminalization of privacy.

Subjects: Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Financial System, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, December 24, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Trojan House Source: The Surveillance Technology Oversight Project; Google Takes Gmail Security to the Next Level with Client-Side Encryption; Hunting for Mastodon Servers; and ByteDance [aka TikTok] employees spied on U.S. journalists, audit finds.

Subjects: Business Research, Cybercrime, Cyberlaw, Cybersecurity, Free Speech, KM, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 10, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Apple Commits to Encrypting iCloud, Drops Phone-Scanning Plans; Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds; Top EU court rules Google must delete inaccurate search results; and Who Is Collecting Data from Your Car?

Subjects: Cybercrime, Cybersecurity, Data Mining, Encryption, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 5 cybersecurity predictions for 2023; Cops Can Extract Data From 10,000 Different Car Models’ Infotainment Systems; A Peek Inside the FBI’s Unprecedented January 6 Geofence Dragnet; and Thinking about taking your computer to the repair shop? Be very afraid.

Subjects: Big Data, Congress, Cybercrime, Cybersecurity, Email, Email Security, KM, Privacy, Search Engines, Search Strategies, Social Media, Spyware, Travel

10 fatal traps that explain why law firm strategic plans are DOA

Patrick J. McKenna is an internationally recognized author, lecturer, strategist and seasoned advisor to the leaders of premier law firms. McKenna’s deep dive into law firm strategic planning delivers a detailed guide on the major errors to circumvent to establish a winning competitive position going forward.

Subjects: Communication Skills, Economy, Information Architecture, Information Management, KM, Law Firm Marketing, Leadership, Legal Profession, Management

For 2023, which tech tools might help your firm flourish?

Nicole L. Black’s actionable checklist begins with an end of year review of your law firm’s achievements and challenges to determine issues and new requirements moving forward. The review will include conducting an audit of your workflow and technology to identify process gaps and ensure efficiency and profitability in the new year. When the audit is completed, identify and implement technologies and service providers that will bridge the gaps identified and establish the foundation for success.

Subjects: Information Architecture, Information Management, KM, Legal Technology

LLRX November 2022 Issue

Articles and Columns for November 2022 10 fatal traps that explain why law firm strategic plans are DOA – Patrick J. McKenna is an internationally recognized author, lecturer, strategist and seasoned advisor to the leaders of premier law firms. McKenna’s deep dive into law firm strategic planning delivers a detailed guide on the major errors to …

Subjects: KM