Category «Technology Trends»

Experts grade Facebook, TikTok, Twitter, YouTube on readiness to handle midterm election misinformation

Professors Dam Hee Kim, Anjana Susarla and Scott Shackelford are experts on social media. They were asked to grade how ready Facebook, TikTok, Twitter and YouTube are to handle the task of misinformation and disinformation in the upcoming election cycles. Social media companies have announced plans to deal with misinformation in the 2022 midterm elections, but the companies vary in their approaches and effectiveness and the result promises to be another jarring challenge to democracy in America.

Subjects: AI, Communication Skills, Internet Trends, KM, Legal Research, Social Media, Technology Trends

Citizens’ social media can provide an antidote to propaganda and disinformation

Robert W. Gehl, Ontario Research Chair of Digital Governance for Social Justice, York University, Canada raises an important issue about a recent Pew report on current state of digital media, news and right-wing propaganda. Gehl states the report misses a large number of alternative social media sites that actively and effectively oppose the right-wing propaganda. This distracts us from real-world solutions to the problems of online hate speech, disinformation and surveillance capitalism.

Subjects: Communication Skills, KM, Legal Research, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cybersecurity issues – October 2, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Google Rolls out ‘Results About You’ for Personal Info Removal; I Said No to Online Cookies. Websites Tracked Me Anyway; Bosses spying on you? Here’s the most disastrous truth about surveillance software; How does identity crime affect victims?; and Say Goodbye to VPNs.

Subjects: AI, Cybercrime, Cybersecurity, E-Commerce, Email, Privacy, Technology Trends, Telecommuting

What is proof-of-stake? A computer scientist explains a new way to make cryptocurrencies, NFTs and metaverse transactions

Prof. Scott Ruoti briefs us on yet another new component in Digital Ledger Technology. Proof-of-stake is a mechanism for achieving consensus on a blockchain. Blockchain is a technology that records transactions that can’t be deleted or altered. It’s a decentralized database, or ledger, that is under no one person or organization’s control. Since no one controls the database, consensus mechanisms, such as proof-of-stake, are needed to coordinate the operation of blockchain-based systems.

Subjects: Blockchain, Cryptocurrency, Economy, Energy, Financial System, Legal Research, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, September 24, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Lens reflections may betray your secrets in Zoom video calls; Multi-factor authentication (MFA) fatigue; How Pig Butchering Scams Work; and Crypto giveaway scams continue to escalate.

Subjects: Cryptocurrency, Cybersecurity, Gadgets, Gadgets/Gizmos, Legal Research, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, September 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Why your organization should plan for deepfake fraud before it happens; FTC Sues Broker Kochava Over Geolocation Data Sales; Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content; and Chrome extensions with 1.4 million installs steal browsing data.

Subjects: Computer Security, Cybercrime, Cybersecurity, Financial System, Internet Trends, Legal Research, Privacy, Search Engines, Social Media, Spyware, Technology Trends

Data Mining Resources 2022

Data mining and knowledge discovery is a quickly evolving field that is part of the portfolio of CI, BI and KM professionals, law librarians, research analysts, infopros, data scientists, data journalists and students in college and graduate programs. This expansive bibliography by Marcus P. Zillman comprises a wealth of information, resources, tools, techniques and applications, as well as links to many open datasets. The subject matter includes data mining, data scrapping, data aggregation, big data and big analytics. The resources include: ebooks and glossaries, research papers, video tutorials and online training, APIs, open source web data extraction tools, datasets, bibliographies, case studies, scientific and academic papers and substantive articles, as well as training and certifications on data mining, and open source code.

Subjects: Big Data, Information Architecture, Information Mapping, KM, Legal Research, Legal Technology, Open Source, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, August 6, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report – Hidden Harms: The Misleading Promise of Monitoring Students Online; Meta, US hospitals sued for using healthcare data to target ads; All software is guilty until proven innocent; and Twitter Faces A Surge In Account Data Requests By Governments.

Subjects: Cybercrime, Cybersecurity, E-Commerce, Health, Healthcare, Legal Research, Privacy, Social Media, Technology Trends

Policing Reimagined

The thesis of Albert Chang’s paper is the metaverse presents a unique opportunity for effective police reforms. Developers, data scientists, and legal sector experts working within the metaverse may be able to implement changes more efficiently than Congress as they are not subject to constitutional constraints. Chang advocates a position that the federal government should strongly consider the adoption of immersive technology to demonstrate that a more effective method of policing is possible. This paper is especially significant in light of the fact that last week Congress passed the CHIPS and Science Act which will bolster research with $290 billion in new funding.

Subjects: Blockchain, Constitutional Law, Criminal Law, Cryptocurrencies, Education, Health, Human Rights, Legal Research, Social Media, Technology Trends, United States Law

Surveillance is pervasive: Yes, you are being watched, even if no one is looking for you

Peter Krapp, Professor of Film & Media Studies, University of California, Irvine shares facts that we need to acknowledge. The United States has the largest number of surveillance cameras per person in the world. Cameras are omnipresent on city streets and in hotels, restaurants, malls and offices. They’re also used to screen passengers for the Transportation Security Administration. And then there are smart doorbells and other home security cameras. Importantly, Krapp highlights not only do we live in a surveillance nation, but those who surveil us do so with virtually no constraints or oversight.

Subjects: Big Data, Civil Liberties, Legal Research, Privacy, Technology Trends, United States Law