Amanda L. Brown, Esq., Legal Technology Consultant, Louisiana Legal Aid Navigator Project, Louisiana Bar Foundation – shares her experience on how using technology is an effective way to bridge the justice gap, and supports this position by demonstrating how data-driven decisions are used to help shine a light on where the needs are to ensure that efforts are then appropriately channeled from the start.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google Quiz – Can you spot when you’re being phished?; Don’t be fooled by fake images and videos online; Study of Password Managers; and Your smartphone is tracking you: How to stop it from sharing data, ads.
Global Industry Analyst Josh Bersin addresses critical employee workplace analysis validating people skills as highly rated employer HR and talent requirements. In professions for whom continuous delivery of outstanding customer services using collaborative and dynamic team efforts is the norm, Bersin’s data driven analysis is a benchmark to expand upon organizational mission, vision and values.
Using the foundational paper, Facts or Knowledge? A Review of Private Internal Reports of Investigations by Fraud Examiners, Bruce Boyes succinctly identifies the difference between facts and knowledge to clarify why organizations should engage in knowledge management.
KM expert Stan Garfield shares ten categories of KM resources, each with ten links to useful sources of knowledge about the field. The ten resources in each category are recommended starting points for those who want to learn more about KM. Each category heading is linked to a more extensive list for greater exploration.
Jason Voiovich goes directly to the heart of the matter with his statements that are a lessons learned guide that no researcher can afford to ignore – “Wasn’t the promise of data-driven, search engine and social media algorithms that they would amplify the truth and protect us from misinformation by tapping the wisdom of crowds? The fact is that they do not. And cannot. Because that is not what they are designed to do. At the heart of every social media algorithm is a fatal flaw that values persuasion over facts. Social media platforms (as well as search engines) are not designed for truth. They are designed for popularity. They are bullshit engines.”
Christopher Kenneally interviewed Marcy Phelps on his Copyright Clearance Center’s podcast series, Beyond the Book. A licensed private eye who earned her master’s degree in library and information science from the University of Denver, Marcy Phelps works for asset management firms, commodity pool operators, M&A professionals, and others. Her detective work combing through databases and other online data dumps helps build a definitive dossier documenting any litigation, bankruptcies, and regulatory actions that could raise unpleasant questions for investors and even uncover unsavory characters.
Alan Rothman suggests a new phrase for a growing subject matter area which he calls Fact-Check Tech. His article introduces to use a prototype TV news voice scanner and fact-checker called Voyc. The significance of this new technology will quickly become apparent to news consumers here in the U.S., and around the world, as we are increasingly confronted with endless charges of “fake news” and counter assertions of what is “real news.” The Voyc technology currently under development can assess the audio of live news media broadcasts to determine the veracity of statements made within seconds of being spoken.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.Note – four significant highlights of this week’s column: The web really isn’t worldwide – every country has different access; Measuring the “Filter Bubble”: How Google is influencing what you click; Grandparents Increasingly Targeted By Impostors Who Know ‘Everything’ About Them; Who lives with you? Facebook seeks to patent software to figure out profiles of households.
This commentary by Zachary Loeb synthesizes the increasingly frequent calls for oversight, regulation and even breaking up giant tech companies who have strayed way beyond their initial mission statements of “don’t be evil” and “helping you connect and share with the people in your life.” Public opinion has decidedly changed on issues concerning Big Tech, and Loeb’s opinion piece distills user concerns into a concise review of the boundaries of “public trust.”