Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Foreign Hackers Swipe Millions in Unemployment Benefits; An Apple whistleblower has publicly slammed the company, claiming it violated ‘fundamental rights’ after Siri recorded users’ intimate moments without consent; Google censored search results after bogus copyright claims; and COVID-19 data sharing with law enforcement sparks concern.
This is Marcus Zillman’s selective and wide ranging guide to mostly free financial, market, benchmarking, data, and knowledge discovery resources on the internet. The guide is especially useful during this time of financial tumult, and will be updated in future as we continue to experience financial volatility around the world. The information covered includes: news, corporate, academic, public/private, scholarly and government sites and services respective to four sections – Corporate Conference Calls Resources, Financial Sources, Financial Sources Search Engines, and Selected Venture Capital Sources.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to Dox Yourself on the Internet; Apple Bans Clearview Facial Recognition App From Its Store; You’re about to be scammed; and Robo lawyer will sue organizations that will not delete your personal info.
In his article Marc Solomon explores how CI/BI researchers, investigators and law librarians, on a personal level, can identify and come to terms with blindspots in the context of performing complex, time sensitive work.
This is part one of an article by Marc Solomon calling on readers to be alert and respond effectively to critical and ongoing challenges – BS Detection in a World of Fake News and Real Threats.
Earlier this year Ron Friedmann presented an interactive session on how law firm libraries can create new value, at the Ark conference Best Practices & Management Strategies for Law Firm Library, Research & Information Services (aka Ark Library). In this article he shares some session highlights, the voting results of the interactive portion, his slides and and a link to his live presentation.
Tech savant, innovator and prognosticator – Jason Voiovich: “How many times in #marketing, #innovation, and #product strategy do we find ourselves looking only at the upside? In our TAM calculations, how often do we subtract out the “negative market” to account for risks? I’ve been doing this for nearly 25 years, and I never did. I suspect you haven’t either. I’m not sure I would have seen this as an obvious next step had I not spent the last year exploring the dark side of #platform strategies from Amazon, Google, Facebook, and Twitter. It’s time to look at these business models holistically. “
Law Librarians: The Missing Link As Solo & Small Firm Lawyers Adapt to Artificial Intelligence – Part 1
In her three part article on AI in Legal Research and Law Practice, Carolyn Elefant, attorney, tech guru, and legal blogger, shares actionable information, knowledge and topical resources that were the foundation of her presentation at the AALL 2019 Annual Meeting in Washington, D.C. Elefant’s mission has always been to ensure that solo and small firms have current information, not just on new technology developments, but also on how these new tools can be applied in practice. AI is a fast-moving target that presents significant challenges to professionals in many roles – lawyers, law librarians, KM, CI/BI, competitive intelligence, marketing, and research analysts to name but a few. Elefant’s primer illuminates the critical role law librarians play in the effective implementation of AI within their organizations. See also Part II and Part III.
It is helpful to classify documents or other content items to make them easier to find later. Searching the full text alone can retrieve inaccurate results or miss appropriate documents containing different words from the words entered into a search box. A document or content management system may include features for tagging, keywords, categories, indexing, etc. Taxonomist Heather Hedden identifies the difference between these elements to facilitate the implementation of more effective knowledge and content management.
How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.