Technology has significantly changed our concept of privacy as well as our ability to maintain it. The are a wide spectrum of tools, services and strategies available to assist you in the effort to maintain a sliding scale of privacy in an increasingly porous, insecure online environment. Whether you are browsing the internet, using email or SMS, encrypting data on PCs or mobile phones, trying to choose the best VPN, or working to secure your online services from cybercrime, hacking or surveillance, Marcus Zillman has identified a wide range of sources for you to consider. The foundational issue regarding privacy is that you must be proactive, diligent and persistent in evaluating and using multiple applications for email, search, file transfer, and social media. There is no “one size fits all” solution, and your vigilance and willingness to remain flexible in applying effective solutions are part of an ongoing process.
Marcus Zillman’s new guide provides a wealth of information to enhance your efforts in conducting expert research on a wide range of subject matters. The guide is also another reminder that Google should not be your go-to subject search engine by demonstrating how choosing to use reliable topic specific sources can deliver greater scope, breath and depth of information for your analysis and reporting. These sites include metasearch, semantic and Deep Web search, with many sources offering advanced search functionality, unique and comprehensive data sets and repositories, dashboards and tools from around the world, all of which are updated and curated effectively and consistently. These sources represent the work of academic, government, consortium, firms and industry.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Here’s How Amazon Third-Party Sellers Reportedly Hound Customers Who Leave Bad Reviews; Microsoft Edge’s ‘Super Duper Secure Mode’ Does What It Says; The Ethics of Data: Anonymity Vs Analytics; and Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises.
Jerry Lawson highly recommends Ann Walsh Long’s new book, A Short & Happy Guide to Advanced Legal Research. Long’s book offers good ideas about balancing quality, speed and expense, as well as a wealth of other insights on improving online legal research.
In his review Jerry Lawson recommends Internet Legal Research on a Budget: Free and Low-Cost Resources for Lawyers, 2nd Edition as the single best resource he knows for lawyers interested in exploring how to cut legal research expenses by trying and using free or inexpensive legal information.
Marcus P. Zillman’s guide comprises an extensive listing of resources and sites for students, researchers, teachers, infopros and parents, on multiple study areas. Sourced from academic, public, private, association and corporate sectors, the subject matters include: distance learning; MOOCs, lecture guides and study notes, study skill resources, online tutoring and homework help, free e-learning videos, scholarship resources and PhD, Dissertation, thesis, and academic writing resources.
Chirag Shah, Associate Professor in the Information School, University of Washington and Founding Director of InfoSeeking Lab, which focuses on issues related to information seeking, human-computer interaction (HCI), and social media. Shah’s research describes how search engines are not just one of society’s primary gateways to information and people, but they are also conduits for misinformation. Similar to problematic social media algorithms, search engines learn to serve you what you and others have clicked on before. Because people are drawn to the sensational, this dance between algorithms and human nature can foster the spread of misinformation.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Paper – A First Look at Zoombombing; Google Chrome’s engineering director discusses how the company is trying to preserve digital advertising after tracking cookies are killed off; NSF pushing for agency-specific cyber-physical research; and They Stormed the Capitol. Their Apps Tracked Them.
This guide by Marcus P. Zillman focuses on free and feed based research browsers and data visualization tools for research and analysis. These resources can be used to support legal research, legal marketing, business and competitive intelligence research, knowledge management and knowledge discovery, and data mining.
Catherine Reach has run the latest version of Microsoft Edge through its paces, and identifies the browser’s useful features (including security and privacy) and collaborative tools that make it worthy of your review and perhaps – switching from Chrome.