Category «KM»

The Bullshit Algorithm

Jason Voiovich goes directly to the heart of the matter with his statements that are a lessons learned guide that no researcher can afford to ignore – “Wasn’t the promise of data-driven, search engine and social media algorithms that they would amplify the truth and protect us from misinformation by tapping the wisdom of crowds? The fact is that they do not. And cannot. Because that is not what they are designed to do. At the heart of every social media algorithm is a fatal flaw that values persuasion over facts. Social media platforms (as well as search engines) are not designed for truth. They are designed for popularity. They are bullshit engines.”

Subjects: Internet Resources, KM, Search Engines, Social Media

A Private Eye in The Library

Christopher Kenneally interviewed Marcy Phelps on his Copyright Clearance Center’s podcast series, Beyond the Book. A licensed private eye who earned her master’s degree in library and information science from the University of Denver, Marcy Phelps works for asset management firms, commodity pool operators, M&A professionals, and others. Her detective work combing through databases and other online data dumps helps build a definitive dossier documenting any litigation, bankruptcies, and regulatory actions that could raise unpleasant questions for investors and even uncover unsavory characters.

Subjects: Business Research, Competitive Intelligence, KM, Legal Research

As a Matter of Fact: A New AI Tool for Real-Time Fact-Checking of News Using Voice Analysis

Alan Rothman suggests a new phrase for a growing subject matter area which he calls Fact-Check Tech. His article introduces to use a prototype TV news voice scanner and fact-checker called Voyc. The significance of this new technology will quickly become apparent to news consumers here in the U.S., and around the world, as we are increasingly confronted with endless charges of “fake news” and counter assertions of what is “real news.” The Voyc technology currently under development can assess the audio of live news media broadcasts to determine the veracity of statements made within seconds of being spoken.

Subjects: AI, Business Research, Communications Law, Competitive Intelligence, Congress, Internet Trends, KM, Libraries & Librarians, Reference Resources, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 9 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.Note – four significant highlights of this week’s column: The web really isn’t worldwide – every country has different access; Measuring the “Filter Bubble”: How Google is influencing what you click; Grandparents Increasingly Targeted By Impostors Who Know ‘Everything’ About Them; Who lives with you? Facebook seeks to patent software to figure out profiles of households.

Subjects: Big Data, Cybercrime, Cybersecurity, Freedom of Information, Internet Filtering, KM, Legal Research, Privacy, Search Engines

Technology giants didn’t deserve public trust in the first place

This commentary by Zachary Loeb synthesizes the increasingly frequent calls for oversight, regulation and even breaking up giant tech companies who have strayed way beyond their initial mission statements of “don’t be evil” and “helping you connect and share with the people in your life.” Public opinion has decidedly changed on issues concerning Big Tech, and Loeb’s opinion piece distills user concerns into a concise review of the boundaries of “public trust.”

Subjects: Big Data, E-Commerce, KM, Privacy, Search Engines, Social Media

Blockchain Challenges

V. Mary Abraham shares her notes from the new Blockchain in Government conference, part of the KMWorld 2018 Conference, that was held November 7-8, 2018 in Washington, D.C. The program speaker was Marcus Ralphs, CEO, ByzGen Ltd. who shared his real-world challenges, both technical and organizational, as well as tips for others starting to use distributed ledger technology.

Subjects: Blockchain, Cybersecurity, KM, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues November 18 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: a new DHS report – Data Craft: The Manipulation of Social Media Metadata; Volunteer disaster response websites grow up; Firefox Quantum to Add Breached Site Alerts; and 10 tax scams you should watch for this season, and how to avoid them.

Subjects: Cybercrime, Cybersecurity, Education, Government Resources, KM, Privacy, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues November 11 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: A Guide to Privacy Resources 2019; Billions of Robocalls – Industry & Regulatory Solution; Powerful Data Privacy Legislation Drafted by Oregon Senator Ron Wyden; and Midterms 2018: Who paid for that Facebook ad? It’s not always clear.

Subjects: Congress, Cybercrime, Cybersecurity, KM, Privacy, Social Media

Top Ten Tips from My Job Search

Kenny Ames shares his job search strategy, presented in a concise, focused and objective article that you can quickly apply to your own search. Ames offers readers a thoughtful and meaningful list of suggestions to help concentrate your energy on highlighting capabilities, strengths as well as colleagues and contacts, and the critical follow-up factor.

Subjects: KM

Pete Recommends – Weekly highlights on cyber security issues October 21 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: The Employer Surveillance State; How to Recover Google Contacts; How to delete your account with Facebook, Google, Amazon, Apple, and more; and last but certainly not least – ‘Do Not Track’ Privacy Tool Doesn’t Do Anything!

Subjects: Big Data, Civil Liberties, Congress, Cybercrime, Cybersecurity, E-Commerce, E-Government, Email, KM, Legal Research, Privacy, Social Media, Spyware