Category «Social Media»

Ukraine doomscrolling can harm your cognition as well as your mood – here’s what to do about it

What use are we in helping to solve difficult global challenges if we’re so depressed and cognitively depleted that we can’t think of the best actions to take? Ukraine doomscrolling can harm your cognition as well as your mood. Professors Barbara Jacquelyn Sahakian, Christelle Langley, Chun Shen and Jianfeng Feng describe their research findings on what to do about it.

Subjects: Healthcare, KM, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 20, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report: Cybersecurity teams need nearly 100 days to develop threat defenses; Russian General Killed After Using Unsecured Phone; A sustainable look at secure device destruction; and Ukraine reportedly adopts Clearview AI to track Russian invaders.

Subjects: Blockchain, Business Research, Cybersecurity, Economy, Financial System, Privacy, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 2022 Guide to Internet Privacy Resources and Tools; Russia creates its own TLS certificate authority to bypass sanctions; Twitter quietly launches Tor service in the face of Russian censorship; Decentralized identity using blockchain.

Subjects: Blockchain, Cybersecurity, Economy, Financial System, Health, Healthcare, Legal Research, Privacy, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 6, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to make software supply chains resilient to cyber attacks; Russian Invasion Highlights Growing Importance of Open Source Intelligence; Cybersecurity: Internet Architecture is Considered Resilient, but Federal Agencies Continue to Address Risks; and Senate passes major cybersecurity legislation to force reporting of cyberattacks and ransomware.

Subjects: Cybercrime, Cybersecurity, Open Source, Social Media

Using News and Social Media for Finding Financial Assets – 5 Top Tips

Private investigator Marcy Phelps searches social media and online news for clients on a daily basis and recommends specific sources as useful for asset investigations. Phelps notes that not everything will show up in public records, and news and social media research helps fill in the gaps. Phelps shares a few examples of useful sources and strategies that made a difference for clients.

Subjects: Business Research, Competitive Intelligence, Search Strategies, Social Media

Pete Recommends Weekly highlights on cyber security issues, February 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: The MY2022 app is a required download for Olympians and looks like a security nightmare; The country inoculating against disinformation; The IRS Says It Will Ditch ID.me’s Facial Recognition; How Phishers Are Slinking Their Links Into LinkedIn; and Health Sites Let Ads Track Visitors Without Telling Them.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, E-Government, Government Resources, Healthcare, Legal Research, Privacy, Social Media, Spyware

Pete Recommends Weekly highlights on cyber security issues, January 29, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: How ID.me’s Face Recognition for IRS, Unemployment Works; A Former Hacker’s Guide to Boosting Your Online Security; White House clamps down on federal cybersecurity after big hacks; How to Download Everything Amazon Knows About You (It’s a Lot); and Teamwork, trust and threat sharing key to cybersecurity.

Subjects: AI, Communications, Cybercrime, Cybersecurity, Data Mining, E-Commerce, Ethics, Free Speech, Freedom of Information, Government Resources, KM, Legal Research, Privacy, Search Engines, Social Media, Telecommuting

Information Quality Resources 2022

Librarians, researchers, journalists, teachers and students are continually confronted with what can be described as a kind of information miasma when using online sites, databases, resources, images and social media. No sector or discipline is immune to misinformation, disinformation, hoaxes, lack of data quality, and biased research. This guide by Marcus Zillman highlights actionable resources to evaluate and identify online malfeasance, as well as sources to verify information and data quality that is critical to our professions. These two efforts often intersect, and require vigilance and continuing education respective to effectively confronting the challenges they present.

Subjects: Big Data, Competitive Intelligence, Education, Information Management, Internet Resources - Web Links, KM, Libraries & Librarians, Reference Resources, Search Strategies, Social Media, Technology Trends, Viruses & Hoaxes

Pete Recommends Weekly highlights on cyber security issues, January 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: You can actually make that old laptop last longer; Law Enforcement and Technology: Using Social Media; Google Drive accounted for the most malware downloads from cloud storage sites in 2021; and The Spine Collector: Man arrested for using fake email addresses to steal hundreds of unpublished manuscripts.

Subjects: Big Data, Competitive Intelligence, CRS Reports, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media