Category «KM»

Truth to Power

Robert McKay discusses his appreciation of the important function of the House of Butter blog, established and run by Sean Hocking. This publication has been continuously engaged in addressing wide reaching and impactful issues concerning the environment and law, the defence and protection of rule of law and in support of those in legal practice who stand up for human rights and equality, rather than simply being focused on profit.

Subjects: KM, Legal Research, Legal Technology

The intentional law office

Legal sector analyst Jordan Furlong writes that it’s taken two years of rolling pandemic lockdowns to shake us from our torpid habit of gathering together only to work alone. Over the next decade, a Stanford professor estimates, US workers will spend a quarter of their work time at home — “the number of person-days in the office is never going back to pre-pandemic average, ever.” This has obvious ramifications for corporate office space, employee well-being, and even climate change. But the workplace itself is ground zero for this change, and there will be enormous ramifications in this regard alone. Furlong’s thought provoking essay identifies critical choices that can be made that will result in better outcomes for law firms moving forward.

Subjects: Communications, KM, Law Firm Marketing, Leadership, Management, Telecommuting

The Russian invasion shows how digital technologies have become involved in all aspects of war

Since Russia invaded Ukraine, we keep hearing that this war is like no other; because Ukrainians have cellphones and access to social media platforms, the traditional control of information and propaganda cannot work and people are able to see through the fog of war. For these communications scholars and historians, Professors Katharina Niemeyer, Dominique Trudel, Heidi J. S. Tworek, Maria Silina and Svitlana Matviyenko, it is important to add nuance to such claims. The question is not so much what is “new” in this war, but rather to understand its specific media dynamics. One important facet of this war is the interplay between old and new media — the many loops that go from Twitter to television to TikTok, and back and forth.

Subjects: AI, Communications, KM, Social Media, Technology Trends

Ukraine doomscrolling can harm your cognition as well as your mood – here’s what to do about it

What use are we in helping to solve difficult global challenges if we’re so depressed and cognitively depleted that we can’t think of the best actions to take? Ukraine doomscrolling can harm your cognition as well as your mood. Professors Barbara Jacquelyn Sahakian, Christelle Langley, Chun Shen and Jianfeng Feng describe their research findings on what to do about it.

Subjects: Healthcare, KM, Social Media

LLRX February 2022 Issue

Articles and Columns for February 2022 Offense v. Defense – The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive …

Subjects: KM

Offense v. Defense

The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Firewalls, Information Management, KM, Legal Research, Privacy, Spyware

Pete Recommends Weekly highlights on cyber security issues, February 5, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: The modern workplace: Will remote tech workers tolerate being monitored?; How to Protect Yourself From Common Scams; Academic Journal Claims it Fingerprints PDFs for ‘Ransomware,’ Not Surveillance; Security agency director urges governors to teach cybersecurity basics; Best Password Manager Reviews; and Democratic Lawmakers Call for Ban of Surveillance Advertising.

Subjects: AI, Congress, Cybercrime, Cybersecurity, Economy, Education, Financial System, KM, Legal Research, Legislative, Privacy

LLRX January 2022 Issue

Articles and Columns for January 2022 A bit about PURLs – Ed Summers, librarian, metadata expert, teacher, and computational expert, delivers an insightful lesson on the Persistent Uniform Resource Locator. PURLs were developed to make URLs more resilient and persistent over time. You could put a PURL into a catalog record and if the URL …

Subjects: KM

Pete Recommends Weekly highlights on cyber security issues, January 29, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: How ID.me’s Face Recognition for IRS, Unemployment Works; A Former Hacker’s Guide to Boosting Your Online Security; White House clamps down on federal cybersecurity after big hacks; How to Download Everything Amazon Knows About You (It’s a Lot); and Teamwork, trust and threat sharing key to cybersecurity.

Subjects: AI, Communications, Cybercrime, Cybersecurity, Data Mining, E-Commerce, Ethics, Free Speech, Freedom of Information, Government Resources, KM, Legal Research, Privacy, Search Engines, Social Media, Telecommuting

A bit about PURLs

Ed Summers, librarian, metadata expert, teacher, and computational expert, delivers an insighful lesson on the Persistent Uniform Resource Locator. PURLs were developed to make URLs more resilient and persistent over time. You could put a PURL into a catalog record and if the URL it pointed to needed to change you changed the redirect on the PURL server, and all the places that pointed to the PURL didn’t need to change. It was a beautifully simple idea, and has influenced other approaches like DOI and Handle. But this simplicity depends on a commitment to keeping the PURL up to date.

Subjects: Archives, Cataloging, Digital Archives, Information Architecture, Information Management, Information Mapping, Internet Resources - Web Links, KM, Reference Resources, Search Strategies