Category «Technology Trends»

What is proof-of-stake? A computer scientist explains a new way to make cryptocurrencies, NFTs and metaverse transactions

Prof. Scott Ruoti briefs us on yet another new component in Digital Ledger Technology. Proof-of-stake is a mechanism for achieving consensus on a blockchain. Blockchain is a technology that records transactions that can’t be deleted or altered. It’s a decentralized database, or ledger, that is under no one person or organization’s control. Since no one controls the database, consensus mechanisms, such as proof-of-stake, are needed to coordinate the operation of blockchain-based systems.

Subjects: Blockchain, Cryptocurrency, Economy, Energy, Financial System, Legal Research, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, September 24, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Lens reflections may betray your secrets in Zoom video calls; Multi-factor authentication (MFA) fatigue; How Pig Butchering Scams Work; and Crypto giveaway scams continue to escalate.

Subjects: Cryptocurrency, Cybersecurity, Gadgets, Gadgets/Gizmos, Legal Research, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, September 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Why your organization should plan for deepfake fraud before it happens; FTC Sues Broker Kochava Over Geolocation Data Sales; Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content; and Chrome extensions with 1.4 million installs steal browsing data.

Subjects: Computer Security, Cybercrime, Cybersecurity, Financial System, Internet Trends, Legal Research, Privacy, Search Engines, Social Media, Spyware, Technology Trends

Data Mining Resources 2022

Data mining and knowledge discovery is a quickly evolving field that is part of the portfolio of CI, BI and KM professionals, law librarians, research analysts, infopros, data scientists, data journalists and students in college and graduate programs. This expansive bibliography by Marcus P. Zillman comprises a wealth of information, resources, tools, techniques and applications, as well as links to many open datasets. The subject matter includes data mining, data scrapping, data aggregation, big data and big analytics. The resources include: ebooks and glossaries, research papers, video tutorials and online training, APIs, open source web data extraction tools, datasets, bibliographies, case studies, scientific and academic papers and substantive articles, as well as training and certifications on data mining, and open source code.

Subjects: Big Data, Information Architecture, Information Mapping, KM, Legal Research, Legal Technology, Open Source, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, August 6, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report – Hidden Harms: The Misleading Promise of Monitoring Students Online; Meta, US hospitals sued for using healthcare data to target ads; All software is guilty until proven innocent; and Twitter Faces A Surge In Account Data Requests By Governments.

Subjects: Cybercrime, Cybersecurity, E-Commerce, Health, Healthcare, Legal Research, Privacy, Social Media, Technology Trends

Policing Reimagined

The thesis of Albert Chang’s paper is the metaverse presents a unique opportunity for effective police reforms. Developers, data scientists, and legal sector experts working within the metaverse may be able to implement changes more efficiently than Congress as they are not subject to constitutional constraints. Chang advocates a position that the federal government should strongly consider the adoption of immersive technology to demonstrate that a more effective method of policing is possible. This paper is especially significant in light of the fact that last week Congress passed the CHIPS and Science Act which will bolster research with $290 billion in new funding.

Subjects: Blockchain, Constitutional Law, Criminal Law, Cryptocurrencies, Education, Health, Human Rights, Legal Research, Social Media, Technology Trends, United States Law

Surveillance is pervasive: Yes, you are being watched, even if no one is looking for you

Peter Krapp, Professor of Film & Media Studies, University of California, Irvine shares facts that we need to acknowledge. The United States has the largest number of surveillance cameras per person in the world. Cameras are omnipresent on city streets and in hotels, restaurants, malls and offices. They’re also used to screen passengers for the Transportation Security Administration. And then there are smart doorbells and other home security cameras. Importantly, Krapp highlights not only do we live in a surveillance nation, but those who surveil us do so with virtually no constraints or oversight.

Subjects: Big Data, Civil Liberties, Legal Research, Privacy, Technology Trends, United States Law

Pete Recommends – Weekly highlights on cyber security issues, July 9, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Why more regulation of connected car technology is probably just up the road; Police sweep Google searches to find suspects. The tactic is facing its first legal challenge; Attackers are using deepfakes to snag remote IT jobs; and Free smartphone stalkerware detection tool gets dedicated hub.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Gadgets/Gizmos, Health, Human Rights, Legal Research, Privacy, Search Engines, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, June 18, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Your connected car could be putting your privacy at risk; Deepfakes on Trial: a Call to Expand the Trial Judge’s Gatekeeping Role to Protect Legal Proceedings from Technological Fakery; Genetic paparazzi are right around the corner, and courts aren’t ready to confront the legal quagmire of DNA theft; and Why You Should Delete (All) Your Tweets.

Subjects: Courts & Technology, Cybercrime, Cybersecurity, Ethics, Healthcare, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, May 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Cyber security 101: Protect your privacy from hackers, spies, and the government; Inside the Government Fiasco That Nearly Closed the U.S. Air System; My Instagram account was hacked and two-factor authentication didn’t help; Serious Warning Issued For Millions Of Google Gmail Users; and Report: Russian Botnet Can Spam Social Media on ‘Massive Scale’.

Subjects: Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, E-Government, Economy, KM, Privacy, Social Media, Technology Trends, Travel