Category «KM»

Pete Recommends – Weekly highlights on cyber security issues June 16, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Artificial intelligence-enhanced journalism offers a glimpse of the future of the knowledge economy; China Summons Tech Giants to Warn Against Cooperating With Trump Ban; New RCE vulnerability impacts nearly half of the internet’s email servers; and NARA Considers Blockchain to Verify Records Amid Rise in Deepfake Videos.

Subjects: AI, Cybercrime, Cybersecurity, E-Government, Economy, Email, Email Security, KM, Privacy

3 Ideas To Future-Proof Your Law Firm

Nicole L. Black’s article is a call to action: ready or not, the legal marketplace is changing and 21st century legal clients are increasingly demanding that their lawyers use technology to increase efficiency and provide more accessible, affordable legal services. How does your law firm compare? What steps is your firm taking to set the stage for success in the new world order? Nicole delivers a road map that firms can use the benchmark their current and moving forward efforts.

Subjects: KM, Legal Technology, Privacy, Technology Trends

Casetext’s New ‘SmartCite’ Citator Is Its Clever Answer to Shepard’s and KeyCite

Robert Ambrogi writes – “Knowing whether a case is good law is elemental to legal research. To do this, lawyers have long relied on citator services such as Shepard’s from LexisNexis and KeyCite from Westlaw. Now, the legal research service Casetext has introduced a citator of its own, called SmartCite, with many of the features you would expect to find in a citator, plus some that make it unique.”

Subjects: AI, Citators, KM, Legal Research, Legal Technology, Technology Trends

Terms, Tags, and Classification

It is helpful to classify documents or other content items to make them easier to find later. Searching the full text alone can retrieve inaccurate results or miss appropriate documents containing different words from the words entered into a search box. A document or content management system may include features for tagging, keywords, categories, indexing, etc. Taxonomist Heather Hedden identifies the difference between these elements to facilitate the implementation of more effective knowledge and content management.

Subjects: Business Research, Case Management, Competitive Intelligence, E-Discovery, Information Architecture, Information Mapping, KM

Online Research Browsers 2019

Marcus Zillman’s guide highlights multifaceted browser alternatives to mainstream search tools that researchers may regularly use by default. There are many reliable yet underutilized applications that facilitate access to and discovery of subject matter specific documents and sources. Free applications included here also offer collaboration tools, resources to build and manage repositories, to employ data visualization, to create and apply metadata management, citations, bibliographies, document discovery and data relationship analysis.

Subjects: Business Research, KM, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues May 5, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google to roll out auto-delete controls for location history and activity data; Rights groups challenge warrantless cellphone searches at U.S. border; U.S. cyber spies unmasked many more American identities in 2018; and Spies, Lies, and Algorithms.

Subjects: AI, Government Resources, Information Management, KM, Legal Research, Mobile Technology, Privacy, Search Engines, Social Media, Technology Trends

Manage Information Overload Resources 2019

As we are challenged each day to expertly respond to an overwhelming amount of information, much of it not relevant to our requirements, it is a major undertaking to exercise our choices skillfully as well as to balance our knowledge resources to best serve our objectives. Marcus Zillman’s guide offers both broader resources on how to manage information overload, as well as sources, tools and techniques to facilitate research productivity.

Subjects: Internet Resources, Internet Resources - Web Links, KM, Legal Research, Technology Trends

Is it a “Good” Case? Can You Rely on BCite, KeyCite, and Shepard’s to Tell You?

Kristina L. Niedringhaus calls our attention to a recent article by Paul Heller whose research identified 357 citing relationships that one or more of the three major citators labeled as negative. “Out of these, all three citators agree that there was negative treatment only 53 times. This means that in 85% of these citing relationships, the three citators do not agree on whether there was negative treatment.”

Subjects: Citators, KM, Legal Research, Legal Research Training, Product Reviews, United States Law

Pete Recommends – Weekly highlights on cyber security issues April 20, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: WikiLeaks set 21st century model for cyber-leak journalism; Your car is watching you. Who owns the data?; Facebook, lose my digits: Here’s how to unlist your phone number; and What e-books at the library mean for your privacy.

Subjects: Cybercrime, Cybersecurity, E-Books, Health, Internet Trends, KM, Libraries & Librarians, Privacy, Social Media