Category «Social Media»

3 reasons for information exhaustion – and what to do about it

An endless flow of information is coming at us constantly: It might be an article a friend shared on Facebook with a sensational headline or wrong information about the spread of the coronavirus. All this information may leave many of us feeling as though we have no energy to engage. As a philosopher who studies knowledge-sharing practices, Mark Satta calls this experience “epistemic exhaustion.” The term “epistemic” comes from the Greek word episteme, often translated as “knowledge.” So epistemic exhaustion is more of a knowledge-related exhaustion. It is not knowledge itself that tires out many of us. Rather, it is the process of trying to gain or share knowledge under challenging circumstances. Currently, there are at least three common sources that, from Satta’s perspective, are leading to such exhaustion. But there are also ways to deal with them.

Subjects: Ethics, KM, Social Media

Pete Recommends – Weekly highlights on cyber security issues, October 31, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Ransomware Guide; Police are using facial recognition for minor crimes because they can; COVID-19 clinical trial: real or fake? Learn how to tell the difference; and Here’s how companies got your phone number and a way to prevent future calls.

Subjects: Civil Liberties, Congress, Cybercrime, Cybersecurity, Internet Use Policies, KM, Libraries & Librarians, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, October 25, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Trump Administration Develops Governmentwide Office Reopening Guidelines, With Contractor Help; USPS looks to monetize its mapping data; Amazon Faces Allegations It Harvested Sensitive Voice Data; and Google: Chinese Hackers Are Posing as McAfee to Install Malware.

Subjects: Civil Liberties, Communications, Congress, Cybercrime, Cybersecurity, Data Mining, Government Resources, Health, Healthcare, Legal Research, Legislative, Privacy, Social Media, United States Law

Pete Recommends – Weekly highlights on cyber security issues, September 26, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The High Privacy Cost of a “Free” Website; Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere; Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress; and FinCEN Files Show How Criminals Use Big-Name Banks To Manage Global Financial Corruption.

Subjects: Business Research, Competitive Intelligence, CRS Reports, Cybercrime, Cybersecurity, Economy, Government Resources, Intellectual Property, Legal Research, Privacy, Search Engines, Social Media, United States Law

Pete Recommends – Weekly highlights on cyber security issues, August 29, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Smartphone Location Tracking Works, and What You Can Do About It; Deep Fakes and National Security; How Facebook and Other Sites Manipulate Your Privacy Choices; and Voice phishing attacks on the rise, CISA, FBI warn private sector.

Subjects: AI, Civil Liberties, Cybercrime, Education, Email Security, Encryption, Gadgets/Gizmos, Health, KM, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 23, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Instagram requires government ID to verify suspicious accounts; How to Clean Up Your Social Media Accounts Without Deleting Them; CBP Shifts to Enterprise Approach to Manage Phone Searches at U.S. Borders; and Amazon shares your private info unless you do these steps.

Subjects: Cybercrime, Cybersecurity, Information Management, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media

Private browsing: What it does – and doesn’t do – to shield you from prying eyes on the web

Prof. Lorrie Cranor, Carnegie Mellon University and Hana Habib, Graduate Research Assistant at the Institute for Software Research, Carnegie Mellon University, highlight their research on how many people who use private browsing have misconceptions about what protection they’re gaining. A common misconception is that these browser modes allow you to browse the web anonymously, surfing the web without websites identifying you and without your internet service provider or your employer knowing what websites you visit. The tools actually provide much more limited protections.

Subjects: Civil Liberties, Competitive Intelligence, Internet Trends, KM, Legal Research, Online Legal Research Services, Privacy, Search Engines, Search Strategies, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues, July 18, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google Sued for Allegedly Tracking App Users After They Opt Out; Twitter hack reveals national security threat as election approaches; EFF Launches Searchable Database of Police Agencies and the Tech Tools They Use to Spy on Communities; Utility company calling? Don’t fall for it.

Subjects: AI, Business Research, Computer Security, Cybercrime, Cybersecurity, Email Security, Healthcare, Legal Research, Privacy, Search Engines, Social Media, Technology Trends