Category «KM»

Online Research Browsers 2019

Marcus Zillman’s guide highlights multifaceted browser alternatives to mainstream search tools that researchers may regularly use by default. There are many reliable yet underutilized applications that facilitate access to and discovery of subject matter specific documents and sources. Free applications included here also offer collaboration tools, resources to build and manage repositories, to employ data visualization, to create and apply metadata management, citations, bibliographies, document discovery and data relationship analysis.

Subjects: Business Research, KM, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues May 5, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google to roll out auto-delete controls for location history and activity data; Rights groups challenge warrantless cellphone searches at U.S. border; U.S. cyber spies unmasked many more American identities in 2018; and Spies, Lies, and Algorithms.

Subjects: AI, Government Resources, Information Management, KM, Legal Research, Mobile Technology, Privacy, Search Engines, Social Media, Technology Trends

Manage Information Overload Resources 2019

As we are challenged each day to expertly respond to an overwhelming amount of information, much of it not relevant to our requirements, it is a major undertaking to exercise our choices skillfully as well as to balance our knowledge resources to best serve our objectives. Marcus Zillman’s guide offers both broader resources on how to manage information overload, as well as sources, tools and techniques to facilitate research productivity.

Subjects: Internet Resources, Internet Resources - Web Links, KM, Legal Research, Technology Trends

Is it a “Good” Case? Can You Rely on BCite, KeyCite, and Shepard’s to Tell You?

Kristina L. Niedringhaus calls our attention to a recent article by Paul Heller whose research identified 357 citing relationships that one or more of the three major citators labeled as negative. “Out of these, all three citators agree that there was negative treatment only 53 times. This means that in 85% of these citing relationships, the three citators do not agree on whether there was negative treatment.”

Subjects: Citators, KM, Legal Research, Legal Research Training, Product Reviews, United States Law

Pete Recommends – Weekly highlights on cyber security issues April 20, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: WikiLeaks set 21st century model for cyber-leak journalism; Your car is watching you. Who owns the data?; Facebook, lose my digits: Here’s how to unlist your phone number; and What e-books at the library mean for your privacy.

Subjects: Cybercrime, Cybersecurity, E-Books, Health, Internet Trends, KM, Libraries & Librarians, Privacy, Social Media

Knowledge Modeling

Taxonomist Heather Hedden compares and contrasts the work of creating a taxonomy to that of creating a knowledge model, which also involve inputs of people and content, but where more emphasis is on stakeholder/user input. As Hedden says, “content contains information, but people contain knowledge, so knowledge modeling requires the input of various people, with the input gathered in a comprehensive and systematic way.” This article clearly identifies more facets of the role of knowledge management within organizations in many sectors.

Subjects: Information Management, KM

A guide to RSS feeds using beSpacific research updates

Pete Weiss is the author of Pete Recommends – Weekly highlights on cyber security. He is a strong advocate of RSS to keep pace with rapidly changing updates in the news, research and technology to name but a few subjects. Using Sabrina Pacifici’s blog, beSpacific, as an example, Weiss offers more than a dozen regularly updated subject matter specific feeds that you should consider adding to your research portfolio.

Subjects: Business Research, KM, Legal Research, RSS Newsfeeds, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues March 16, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Inside Facebook’s physical security that protects Zuckerberg, employees; Many Americans do not trust modern institutions to protect their personal data – even as they frequently neglect cybersecurity best practices in their own personal lives; Some beSpacific (and LLRX) Subjects (topics) in which you may have an interest; and Firefox Send – Free File Transfers while Keeping your Personal Information Private.

Subjects: Big Data, Congress, Cybercrime, Cybersecurity, KM, Legal Research, Privacy, RSS Newsfeeds, Social Media, Viruses & Hoaxes

Using Google Maps costs more than you think.

Jason Voiovich’s article focuses on a subject of recent attention by Congress, privacy groups and journalists, both in the U.S. and abroad. Tech Giants distribute services and applications that are free, but nevertheless track and monitor your mobile activities – collecting, aggregating and monetizing information about many facets of your daily life. In this case, Voiovich discusses Google Maps with the understanding that his evaluation is applicable to many other services and companies – all of whom are providing you with their “services” at no “cost” until such time as you understand the price you are really paying to use them.

Subjects: Civil Liberties, Internet Trends, Internet Use Policies, KM, Mobile Tech, Privacy, Search Engines, Technology Trends