Category «Search Engines»

Pete Recommends – Weekly highlights on cyber security issues June 8, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Privacy concerns don’t stop people from putting their DNA on the internet to help solve crimes; Fake LinkedIn Profiles Are Impossible to Detect; Google quietly ruined Chrome, and we almost missed it; Enforcing Federal Privacy Law – Constitutional Limitations on Private Rights of Action.

Subjects: Criminal Law, Cyberlaw, Legal Research, Privacy, Search Engines, Social Media

Online Research Browsers 2019

Marcus Zillman’s guide highlights multifaceted browser alternatives to mainstream search tools that researchers may regularly use by default. There are many reliable yet underutilized applications that facilitate access to and discovery of subject matter specific documents and sources. Free applications included here also offer collaboration tools, resources to build and manage repositories, to employ data visualization, to create and apply metadata management, citations, bibliographies, document discovery and data relationship analysis.

Subjects: Business Research, KM, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues May 5, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google to roll out auto-delete controls for location history and activity data; Rights groups challenge warrantless cellphone searches at U.S. border; U.S. cyber spies unmasked many more American identities in 2018; and Spies, Lies, and Algorithms.

Subjects: AI, Government Resources, Information Management, KM, Legal Research, Mobile Technology, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues March 23, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Privacy. Yes, we’ll think about privacy, says FCC mulling cellphone location data overhaul; Are Health Apps Putting Your Privacy at Risk?; White House officials using personal accounts to do official work; and Michael Cohen warrants show how the FBI can unlock your phone and track your movements.

Subjects: Civil Liberties, Cybersecurity, Email, Email Security, Healthcare, Privacy, Search Engines

Using Google Maps costs more than you think.

Jason Voiovich’s article focuses on a subject of recent attention by Congress, privacy groups and journalists, both in the U.S. and abroad. Tech Giants distribute services and applications that are free, but nevertheless track and monitor your mobile activities – collecting, aggregating and monetizing information about many facets of your daily life. In this case, Voiovich discusses Google Maps with the understanding that his evaluation is applicable to many other services and companies – all of whom are providing you with their “services” at no “cost” until such time as you understand the price you are really paying to use them.

Subjects: Civil Liberties, Internet Trends, Internet Use Policies, KM, Mobile Tech, Privacy, Search Engines, Technology Trends

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies

The Bullshit Algorithm

Jason Voiovich goes directly to the heart of the matter with his statements that are a lessons learned guide that no researcher can afford to ignore – “Wasn’t the promise of data-driven, search engine and social media algorithms that they would amplify the truth and protect us from misinformation by tapping the wisdom of crowds? The fact is that they do not. And cannot. Because that is not what they are designed to do. At the heart of every social media algorithm is a fatal flaw that values persuasion over facts. Social media platforms (as well as search engines) are not designed for truth. They are designed for popularity. They are bullshit engines.”

Subjects: Internet Resources, KM, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 9 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.Note – four significant highlights of this week’s column: The web really isn’t worldwide – every country has different access; Measuring the “Filter Bubble”: How Google is influencing what you click; Grandparents Increasingly Targeted By Impostors Who Know ‘Everything’ About Them; Who lives with you? Facebook seeks to patent software to figure out profiles of households.

Subjects: Big Data, Cybercrime, Cybersecurity, Freedom of Information, Internet Filtering, KM, Legal Research, Privacy, Search Engines

Technology giants didn’t deserve public trust in the first place

This commentary by Zachary Loeb synthesizes the increasingly frequent calls for oversight, regulation and even breaking up giant tech companies who have strayed way beyond their initial mission statements of “don’t be evil” and “helping you connect and share with the people in your life.” Public opinion has decidedly changed on issues concerning Big Tech, and Loeb’s opinion piece distills user concerns into a concise review of the boundaries of “public trust.”

Subjects: Big Data, E-Commerce, KM, Privacy, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues November 18 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: a new DHS report – Data Craft: The Manipulation of Social Media Metadata; Volunteer disaster response websites grow up; Firefox Quantum to Add Breached Site Alerts; and 10 tax scams you should watch for this season, and how to avoid them.

Subjects: Cybercrime, Cybersecurity, Education, Government Resources, KM, Privacy, Search Engines, Social Media