Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to Dox Yourself on the Internet; Apple Bans Clearview Facial Recognition App From Its Store; You’re about to be scammed; and Robo lawyer will sue organizations that will not delete your personal info.
In his article Marc Solomon explores how CI/BI researchers, investigators and law librarians, on a personal level, can identify and come to terms with blindspots in the context of performing complex, time sensitive work.
Recent surveys found that trust in local media is higher than for national media, yet many newsrooms are struggling financially. Damian Radcliffe, Caroline S. Chambers Professor in Journalism at the University of Oregon, suggests four ways local newsrooms can forge deeper relationships with the communities they serve.
Anna Irvin, Ph.D. and Janice E. Henderson, Esq. presented this comprehensive 64 page guide at the LLAGNY Education Committee Program on October 15, 2019. The guide is an multidisciplinary resource that includes: articles from law, business and finance journals, CLE programs/materials, smart contracts, Westlaw and Practical Law citations, sources on the impact of blockchain on the U.S. government and the international regulatory landscape, as well as all states with blockchain and cybersecurity laws (introduced, pending and failed).
Earlier this year Ron Friedmann presented an interactive session on how law firm libraries can create new value, at the Ark conference Best Practices & Management Strategies for Law Firm Library, Research & Information Services (aka Ark Library). In this article he shares some session highlights, the voting results of the interactive portion, his slides and and a link to his live presentation.
Tech savant, innovator and prognosticator – Jason Voiovich: “How many times in #marketing, #innovation, and #product strategy do we find ourselves looking only at the upside? In our TAM calculations, how often do we subtract out the “negative market” to account for risks? I’ve been doing this for nearly 25 years, and I never did. I suspect you haven’t either. I’m not sure I would have seen this as an obvious next step had I not spent the last year exploring the dark side of #platform strategies from Amazon, Google, Facebook, and Twitter. It’s time to look at these business models holistically. “
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Medicare fraud, identity theft: Genetic testing scams target seniors; NIST Publishes Multifactor Authentication Practice Guide; “You Can Probably Be Identified From Your Anonymized Data”; and CIS Releases Newsletter on Cleaning Up Data and Devices.
It is helpful to classify documents or other content items to make them easier to find later. Searching the full text alone can retrieve inaccurate results or miss appropriate documents containing different words from the words entered into a search box. A document or content management system may include features for tagging, keywords, categories, indexing, etc. Taxonomist Heather Hedden identifies the difference between these elements to facilitate the implementation of more effective knowledge and content management.
Marcus Zillman’s guide highlights multifaceted browser alternatives to mainstream search tools that researchers may regularly use by default. There are many reliable yet underutilized applications that facilitate access to and discovery of subject matter specific documents and sources. Free applications included here also offer collaboration tools, resources to build and manage repositories, to employ data visualization, to create and apply metadata management, citations, bibliographies, document discovery and data relationship analysis.
Pete Weiss is the author of Pete Recommends – Weekly highlights on cyber security. He is a strong advocate of RSS to keep pace with rapidly changing updates in the news, research and technology to name but a few subjects. Using Sabrina Pacifici’s blog, beSpacific, as an example, Weiss offers more than a dozen regularly updated subject matter specific feeds that you should consider adding to your research portfolio.