Kristina L. Niedringhaus calls our attention to a recent article by Paul Heller whose research identified 357 citing relationships that one or more of the three major citators labeled as negative. “Out of these, all three citators agree that there was negative treatment only 53 times. This means that in 85% of these citing relationships, the three citators do not agree on whether there was negative treatment.”
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: WikiLeaks set 21st century model for cyber-leak journalism; Your car is watching you. Who owns the data?; Facebook, lose my digits: Here’s how to unlist your phone number; and What e-books at the library mean for your privacy.
Taxonomist Heather Hedden compares and contrasts the work of creating a taxonomy to that of creating a knowledge model, which also involve inputs of people and content, but where more emphasis is on stakeholder/user input. As Hedden says, “content contains information, but people contain knowledge, so knowledge modeling requires the input of various people, with the input gathered in a comprehensive and systematic way.” This article clearly identifies more facets of the role of knowledge management within organizations in many sectors.
Pete Weiss is the author of Pete Recommends – Weekly highlights on cyber security. He is a strong advocate of RSS to keep pace with rapidly changing updates in the news, research and technology to name but a few subjects. Using Sabrina Pacifici’s blog, beSpacific, as an example, Weiss offers more than a dozen regularly updated subject matter specific feeds that you should consider adding to your research portfolio.
Stan Garfield’s actionable list to establish and sustain workplace cooperation and communication is a useful reminder as well as a guide to share and reference with teams and leaders throughout the year.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Inside Facebook’s physical security that protects Zuckerberg, employees; Many Americans do not trust modern institutions to protect their personal data – even as they frequently neglect cybersecurity best practices in their own personal lives; Some beSpacific (and LLRX) Subjects (topics) in which you may have an interest; and Firefox Send – Free File Transfers while Keeping your Personal Information Private.
Jason Voiovich’s article focuses on a subject of recent attention by Congress, privacy groups and journalists, both in the U.S. and abroad. Tech Giants distribute services and applications that are free, but nevertheless track and monitor your mobile activities – collecting, aggregating and monetizing information about many facets of your daily life. In this case, Voiovich discusses Google Maps with the understanding that his evaluation is applicable to many other services and companies – all of whom are providing you with their “services” at no “cost” until such time as you understand the price you are really paying to use them.
V. Mary Abraham shares the law firm ranking system used by Fidelity’s Head of Legal Innovation.
Genevieve Zook’s article is an actionable pathfinder to identifying inaccurate and false content published and shared online in multiple formats, including: news, social media activity, videos, photos, speeches and government documents. Zook references reliable tools and resources authored by librarians, educators, researchers and journalists that apply techniques critical to distinguishing the Currency, Relevance, Authority, Accuracy, and Purpose of information with which we interact daily.
Amanda L. Brown, Esq., Legal Technology Consultant, Louisiana Legal Aid Navigator Project, Louisiana Bar Foundation – shares her experience on how using technology is an effective way to bridge the justice gap, and supports this position by demonstrating how data-driven decisions are used to help shine a light on where the needs are to ensure that efforts are then appropriately channeled from the start.