Category «Librarian Resources»

Web Guide for the New Economy 2022

Accurate and actionable data on the economy is critical to many aspects of our research and scholarship. This guide by research expert Marcus P. Zillman provides researchers with links to information on a range of sources focused on new economy data and analysis from the public and private sectors, as well as scholarly work, news, government information, reports and alerts. Many of these sources should find a place in your customized research toolkit. The sites recommended in this guide are all free to use, and they are published by advocacy, government, corporate, academic, international financial groups and research experts. Many of the sites are updated on a regular basis, so it is recommended that you use RSS feeds or alerts to remain abreast of changes.

Subjects: Big Data, Business Research, Competitive Intelligence, Congress, Economy, Financial System, Government Resources, Internet Resources, KM, Legal Research, Search Strategies, United States Law

Propaganda, Mis- and Disinformation, and Censorship: The War for Hearts and Minds

Author and blogger Dave Pollard addresses the incendiary global war of lies vs. truth, reminiscent of the MAD Magazine cartoon Spy Vs. Spy for those who of us who can recall the scenarios they played which remain eerily prescient. Pollard posits the most effective way to win and retain political power is by seizing the hearts and minds of citizens through a mix of propaganda, mis- and disinformation, and censorship. He continues, this is especially true now, living with a ubiquitous and unceasing firehose of often-conflicting information, and exploitative for-profit “social” media controlled by a handful of dimwitted and unstable western oligarchs.

Subjects: Communications, Competitive Intelligence, Ethics, Free Speech, Information Management, KM, News Resources, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 20, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report: Cybersecurity teams need nearly 100 days to develop threat defenses; Russian General Killed After Using Unsecured Phone; A sustainable look at secure device destruction; and Ukraine reportedly adopts Clearview AI to track Russian invaders.

Subjects: Blockchain, Business Research, Cybersecurity, Economy, Financial System, Privacy, Social Media

Offense v. Defense

The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Firewalls, Information Management, KM, Legal Research, Privacy, Spyware

Using News and Social Media for Finding Financial Assets – 5 Top Tips

Private investigator Marcy Phelps searches social media and online news for clients on a daily basis and recommends specific sources as useful for asset investigations. Phelps notes that not everything will show up in public records, and news and social media research helps fill in the gaps. Phelps shares a few examples of useful sources and strategies that made a difference for clients.

Subjects: Business Research, Competitive Intelligence, Search Strategies, Social Media

A bit about PURLs

Ed Summers, librarian, metadata expert, teacher, and computational expert, delivers an insighful lesson on the Persistent Uniform Resource Locator. PURLs were developed to make URLs more resilient and persistent over time. You could put a PURL into a catalog record and if the URL it pointed to needed to change you changed the redirect on the PURL server, and all the places that pointed to the PURL didn’t need to change. It was a beautifully simple idea, and has influenced other approaches like DOI and Handle. But this simplicity depends on a commitment to keeping the PURL up to date.

Subjects: Archives, Cataloging, Digital Archives, Information Architecture, Information Management, Information Mapping, Internet Resources - Web Links, KM, Reference Resources, Search Strategies

Information Quality Resources 2022

Librarians, researchers, journalists, teachers and students are continually confronted with what can be described as a kind of information miasma when using online sites, databases, resources, images and social media. No sector or discipline is immune to misinformation, disinformation, hoaxes, lack of data quality, and biased research. This guide by Marcus Zillman highlights actionable resources to evaluate and identify online malfeasance, as well as sources to verify information and data quality that is critical to our professions. These two efforts often intersect, and require vigilance and continuing education respective to effectively confronting the challenges they present.

Subjects: Big Data, Competitive Intelligence, Education, Information Management, Internet Resources - Web Links, KM, Libraries & Librarians, Reference Resources, Search Strategies, Social Media, Technology Trends, Viruses & Hoaxes

Pete Recommends Weekly highlights on cyber security issues, January 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: You can actually make that old laptop last longer; Law Enforcement and Technology: Using Social Media; Google Drive accounted for the most malware downloads from cloud storage sites in 2021; and The Spine Collector: Man arrested for using fake email addresses to steal hundreds of unpublished manuscripts.

Subjects: Big Data, Competitive Intelligence, CRS Reports, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media

Remote Work Proves the Firm Library Is More Than a Physical Space

Marshall Voizard is a law firm reference supervisor. He shares significant insights into the profession in the time of COVID. Voizard states that the past 18 months have accelerated positive changes, illustrating to all that the library is no longer primarily a physical place, but rather an entire ecosystem of electronic legal information resources. Our expert guidance is needed more than ever.

Subjects: Business Research, Competitive Intelligence, KM, Law Librarians, Legal Marketing, Library Marketing, Online Legal Research Services, Technology Trends