Category «Legal Technology»

Manage Information Overload Resources 2019

As we are challenged each day to expertly respond to an overwhelming amount of information, much of it not relevant to our requirements, it is a major undertaking to exercise our choices skillfully as well as to balance our knowledge resources to best serve our objectives. Marcus Zillman’s guide offers both broader resources on how to manage information overload, as well as sources, tools and techniques to facilitate research productivity.

Subjects: Internet Resources, Internet Resources - Web Links, KM, Legal Research, Technology Trends

Is it a “Good” Case? Can You Rely on BCite, KeyCite, and Shepard’s to Tell You?

Kristina L. Niedringhaus calls our attention to a recent article by Paul Heller whose research identified 357 citing relationships that one or more of the three major citators labeled as negative. “Out of these, all three citators agree that there was negative treatment only 53 times. This means that in 85% of these citing relationships, the three citators do not agree on whether there was negative treatment.”

Subjects: Citators, KM, Legal Research, Legal Research Training, Product Reviews, United States Law

Pete Recommends – Weekly highlights on cyber security issues April 28, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: ‘They think they are above the law’: the firms that own America’s voting system; Why You Should Use a Password Manager; Cyberspies Hijacked the Internet Domains of Entire Countries; and Huawei: Chinese spies or trustworthy 5G industry partner?

Subjects: Cybersecurity, Mobile Technology, Privacy, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues April 20, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: WikiLeaks set 21st century model for cyber-leak journalism; Your car is watching you. Who owns the data?; Facebook, lose my digits: Here’s how to unlist your phone number; and What e-books at the library mean for your privacy.

Subjects: Cybercrime, Cybersecurity, E-Books, Health, Internet Trends, KM, Libraries & Librarians, Privacy, Social Media

Legal Research: Resources for Reviewing Employment Policies on Harassment

This timely guide by Genevieve Zook, reference & instructional services librarian at the U.W. Law Library, addresses the significant issue of sexual harassment in the workplace. Employers are increasingly reviewing sexual harassment policies and procedures in their organizations, and Zook’s comprehensive guide is an actionable resource with which to effectively engage and implement positive change.

Subjects: Civil Liberties, Education, Internet Resources, Legal Research, Online Legal Research Services, Reference Resources, Search Strategies

Opinion – How a national library endowment could help Philadelphia

David Rothman continues his advocacy for a national library endowment to help K-12 and public libraries in Philadelphia, and around the country. His argument in favor of such an endowment is especially resonant in light of the recent college entrance cheating and bribery scams involving the children of wealthy parents and celebrities.

Subjects: Economy, Education, Libraries & Librarians, Reference Services

Knowledge Modeling

Taxonomist Heather Hedden compares and contrasts the work of creating a taxonomy to that of creating a knowledge model, which also involve inputs of people and content, but where more emphasis is on stakeholder/user input. As Hedden says, “content contains information, but people contain knowledge, so knowledge modeling requires the input of various people, with the input gathered in a comprehensive and systematic way.” This article clearly identifies more facets of the role of knowledge management within organizations in many sectors.

Subjects: Information Management, KM

A guide to RSS feeds using beSpacific research updates

Pete Weiss is the author of Pete Recommends – Weekly highlights on cyber security. He is a strong advocate of RSS to keep pace with rapidly changing updates in the news, research and technology to name but a few subjects. Using Sabrina Pacifici’s blog, beSpacific, as an example, Weiss offers more than a dozen regularly updated subject matter specific feeds that you should consider adding to your research portfolio.

Subjects: Business Research, KM, Legal Research, RSS Newsfeeds, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues March 30, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Data Breaches: Range of Consumer Risks Highlights Limitations of Identity Theft Services; How Digital Wallets Work; NSO Group CEO on “60 Minutes”: Hacking Lawyers, Reporters Is OK; and How to permanently delete your Google account (and save your data).

Subjects: Congress, Cybercrime, Cyberlaw, Cybersecurity, E-Government, Email, Legal Profession, Privacy, Social Media