How Your Client Views Your Firm
V. Mary Abraham shares the law firm ranking system used by Fidelity’s Head of Legal Innovation.
V. Mary Abraham shares the law firm ranking system used by Fidelity’s Head of Legal Innovation.
Genevieve Zook’s article is an actionable pathfinder to identifying inaccurate and false content published and shared online in multiple formats, including: news, social media activity, videos, photos, speeches and government documents. Zook references reliable tools and resources authored by librarians, educators, researchers and journalists that apply techniques critical to distinguishing the Currency, Relevance, Authority, Accuracy, and Purpose of information with which we interact daily.
Amanda L. Brown, Esq., Legal Technology Consultant, Louisiana Legal Aid Navigator Project, Louisiana Bar Foundation – shares her experience on how using technology is an effective way to bridge the justice gap, and supports this position by demonstrating how data-driven decisions are used to help shine a light on where the needs are to ensure that efforts are then appropriately channeled from the start.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google Quiz – Can you spot when you’re being phished?; Don’t be fooled by fake images and videos online; Study of Password Managers; and Your smartphone is tracking you: How to stop it from sharing data, ads.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Microsoft Security Lead Outlines the Perils of Still Using Internet Explorer; No more robocalls: How to block unwanted calls from iPhone, Android; How your health information is sold and turned into ‘risk scores’; and The Best Websites to Find out If You’ve Been Hacked.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Lawmakers warn of ‘deepfake’ videos ahead of 2020 election; Cyberattacks in Medicine: Is Radiology the Weakest Link?; Vint Cerf sees a big danger from the internet of things; and Facebook’s ‘Friendly Fraud Scandal’: What Parents Need to Know.
Global Industry Analyst Josh Bersin addresses critical employee workplace analysis validating people skills as highly rated employer HR and talent requirements. In professions for whom continuous delivery of outstanding customer services using collaborative and dynamic team efforts is the norm, Bersin’s data driven analysis is a benchmark to expand upon organizational mission, vision and values.
Using the foundational paper, Facts or Knowledge? A Review of Private Internal Reports of Investigations by Fraud Examiners, Bruce Boyes succinctly identifies the difference between facts and knowledge to clarify why organizations should engage in knowledge management.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: News outle’s email security gap; On Facebook and Twitter your privacy is at risk — even if you don’t have an account; The Smart TV Crapware Era Has Already Begun; and Mastercard Makes It Easier to Quit Free Trials.
KM expert Stan Garfield shares ten categories of KM resources, each with ten links to useful sources of knowledge about the field. The ten resources in each category are recommended starting points for those who want to learn more about KM. Each category heading is linked to a more extensive list for greater exploration.