Category «Competitive Intelligence»

Managing Metadata: An Examination of Successful Approaches

If Google can deliver results across the entire internet in seconds, why do I have so much trouble finding things in my organization?” asked Jonathan Adams, Research Director at Infogix, at the DATAVERSITY® DGVision Conference, December 2019. In a presentation titled, “I Never Metadata I did Not Like” Adams outlined successful approaches to understanding and managing metadata – as reported by Amber Lee Dennis.

Subjects: Business Research, Competitive Intelligence, E-Discovery, Information Architecture, Information Management, Information Mapping, KM, Search Engines, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, September 26, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The High Privacy Cost of a “Free” Website; Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere; Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress; and FinCEN Files Show How Criminals Use Big-Name Banks To Manage Global Financial Corruption.

Subjects: Business Research, Competitive Intelligence, CRS Reports, Cybercrime, Cybersecurity, Economy, Government Resources, Intellectual Property, Legal Research, Privacy, Search Engines, Social Media, United States Law

Internet Archive Open Library lawsuit moves forward; arguments set for November 2021

Chris Meadows discusses the ongoing case by four publishers, Hachette Book Group, HarperCollins Publishers, John Wiley & Sons and Penguin Random House, against the Internet Archives Open Library respective to the scanning, public display, and distribution of entire literary works. As noted, this is “a potentially sensitive, and complex litigation.” The future of the Internet Archive may hang in the balance. This case is shining light on the heightened importance of evaluating fair use during a pandemic that is keeping vast books collections out of users reach for the unforeseeable future, while most education is confined to distance learning.

Subjects: Business Research, Competitive Intelligence, Distance Learning, Education, KM, Legal Research, Libraries & Librarians, Search Engines, Virtual Library

Statistics Resources and Big Data on the Internet 2020

This expansive listing by Marcus P. Zillman focuses on statistics and big data datasets available free on the internet, covering multiple disciplines, for teaching, learning and reference. These data are published and maintained by sources that include: the U.S. and foreign governments, academic, corporate, NGOs, and open source communities.

Subjects: AI, Business Research, Competitive Intelligence, Economy, Education, Financial System, Legal Research, Open Source, Search Engines

Mining Data on the Internet 2020

Data mining is a constantly evolving discipline applied in many fields including finance, law, healthcare, marketing, science and engineering, the retail industry, telecommunications, social media, and government. This guide by Marcus P. Zillman encompasses free, fee based and consultancy related sources to assist info pros, researchers, data analysts, knowledge managers and CI/BI experts to effectively identify, analyze and apply reliable, value added data within the scope of their respective work products.

Subjects: AI, Business Research, Competitive Intelligence, Data Mining, Economy, Financial System, Internet Resources, KM, Legal Research, Open Source

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media

Private browsing: What it does – and doesn’t do – to shield you from prying eyes on the web

Prof. Lorrie Cranor, Carnegie Mellon University and Hana Habib, Graduate Research Assistant at the Institute for Software Research, Carnegie Mellon University, highlight their research on how many people who use private browsing have misconceptions about what protection they’re gaining. A common misconception is that these browser modes allow you to browse the web anonymously, surfing the web without websites identifying you and without your internet service provider or your employer knowing what websites you visit. The tools actually provide much more limited protections.

Subjects: Civil Liberties, Competitive Intelligence, Internet Trends, KM, Legal Research, Online Legal Research Services, Privacy, Search Engines, Search Strategies, Social Media, Spyware

Pete Recommends Weekly Highlights on Cyber security Issues July 5, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Industry Calls on Government to Invest Billions for Developing Secure 5G Networks; Enterprise IT concerns – quarantined workers breaking company policy could expose enterprise systems and data; What is a credit bureau?; and Key questions about enforcement of California’s privacy law.

Subjects: Business Research, Competitive Intelligence, Cybercrime, Cybersecurity, E-Commerce, Economy, Encryption, Energy, Health, Healthcare, KM, Legal Research, Technology Trends