Category «Social Media»

Scam Baiting: An Innovative Approach to Combating Online Fraud

The thesis of Kyra Strick’s instructive paper promotes a proactive approach to a rapidly increasing online security crisis. Strick states that in the dynamic landscape of cybersecurity, scam baiting has emerged as a captivating and unconventional approach to combating online fraud. Scam baiting is the practice of engaging with scammers to expose their tactics and disrupt their operations. It serves as an offensive and a defensive measure, safeguarding individuals from falling prey to scams, promoting data protection education, and empowering individuals to protect their digital security.

Subjects: Cybercrime, Cybersecurity, Economy, Financial System, KM, Legal Research, Social Media

Toward a durable, dictator-proof Washington Post

David H. Rothman’s timely, out of the box commentary addresses the growing wave of news outlets abruptly closing down their websites, laying off staff, and in some cases, eliminating access to their respective archives. Rothman proposes an alternative to “how do I charge them enough” to stem the tide of closures, an avenue he prompts billionaire Jeff Bezos, owner of the Washington Post, to consider. A good-sized trust or corporate equivalent would enable the Washington Post to be run as a sustainable enterprise in the public interest, rather than as a mere profit generator.

Subjects: Civil Liberties, Economy, Ethics, Free Speech, Freedom of Information, KM, Leadership, Management, Social Media, Technology Trends

Publishing for Profit: Selecting the Best Publisher

Jerry Lawson offers his expert advise on how lawyers (and other ambitious people) can profit by publishing. One method is to begin by focusing on your desired result. What are the best publishers for you and your work product? Lawson offers a couple of ways to identify the potential publishers likely to provide the most benefit.

Subjects: AI, Book Reviews, Communication Skills, KM, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues, February 24, 2024

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: As AI Looms Large, FTC Says Big Tech Can’t Feed it Your Data Without Your Permission; Protect Yourself from Identity Thieves; Survey Finds Workers are Putting Businesses at Risk by Oversharing with GenAI Tools; and Meet the shady companies helping governments hack citizens’ phones.

Subjects: AI, Big Data, Cybersecurity, Economy, Financial System, Government Resources, Healthcare, KM, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, February 17, 2024

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Inside the Underground Site Where ‘Neural Networks’ Churn Out Fake IDs; 5 Steps to Improve Your Security Posture in Microsoft Teams; Drone surveillance case in Michigan Supreme Court tests privacy rights; and ‘AI Washing’ Is a Risk Amid Wall Street’s Craze, SEC Chief Gesler Says.

Subjects: AI, Cybercrime, Cybersecurity, Email Security, Federal Legislative Research, Financial System, Firewalls, Healthcare, Legal Research, Privacy, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues, February 11, 2024

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to detect poisoned data in machine learning datasets; Using Google Search to Find Software Can Be Risky; UnitedHealth uses AI model with 90% error rate to deny care, lawsuit alleges; and How U.S. health care providers deal with hundreds of data breaches every year.

Subjects: AI, Cryptocurrency, Cybercrime, Cybersecurity, Healthcare, Insurance Law, Privacy, Social Media

Each Facebook User is Monitored by Thousands of Companies

By now most internet users know their online activity is constantly tracked. No one should be shocked to see ads for items they previously searched for, or to be asked if their data can be shared with an unknown number of “partners.” But what is the scale of this surveillance? Judging from data collected by Facebook and newly described in a unique study by non-profit consumer watchdog Consumer Reports and the Markup, Jon Keegan writes that it’s massive, and examining the data may leave you with more questions than answers.

Subjects: Big Data, Cybercrime, Cybersecurity, E-Commerce, Privacy, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues, January 27, 2024

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Sen. Wyden Releases Documents Confirming the NSA Buys Americans’ Internet Browsing Records; Inside a Global Phone Spy Tool Monitoring Billions; AT&T is trying to kill all landlines in California, which would have devastating effects; and the Continued Threat to Personal Data: Key Factors Behind the 2023 Increase.

Subjects: AI, Copyright, Cybercrime, Cybersecurity, Healthcare, Internet Trends, Legal Research, Legislative, Privacy, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues, January 20, 2024

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: More Police Are Using Your Cameras for Video Evidence; How to Opt Out of Comcast’s Xfinity Storing Your Sensitive Data; The worst privacy washing of 2023 and trends to expect in 2024; and Each Facebook User is Monitored by Thousands of Companies.

Subjects: AI, Cybercrime, Cybersecurity, Email Security, Privacy, Social Media

Jan. 6 was an example of networked incitement

The shocking events of Jan. 6, 2021, signaled a major break from the nonviolent rallies that categorized most major protests over the past few decades. What set Jan. 6 apart was the president of the United States using his cellphone to direct an attack on the Capitol, and those who stormed the Capitol being wired and ready for insurrection. Joan Donovan and her co-authors, a media and disinformation scholar, call this networked incitement: influential figures inciting large-scale political violence via social media. Networked incitement involves insurgents communicating across multiple platforms to command and coordinate mobilized social movements in the moment of action.

Subjects: Communications, Congress, Constitutional Law, Criminal Law, Government Contracts, Leadership, Legal Research, Social Media, Terrorism, United States Law