Category «Social Media»

What the First Amendment really says – 4 basic principles of free speech in the US

Lynn Greenky, Associate Professor of Communication and Rhetorical Studies, Syracuse University delves into Elon Musk’s claim that he believes in free speech no matter what. He calls it a bulwark against tyranny in America and promises to reconstruct Twitter, which he now owns, so that its policy on free expression “matches the law.” Yet his grasp of the First Amendment – the law that governs free speech in the U.S. – appears to be quite limited. And he’s not alone.

Subjects: Communications, Free Speech, Legal Research, Social Media, United States Law

Pete Recommends – Weekly highlights on cyber security issues, January 21, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Apple Faces Third Class-Action Lawsuit Over Privacy Problems; Will Europe’s Privacy Bill of Rights Ever Truly Be Enforced?; Cybersecurity High-Risk Series: Challenges in Establishing a Comprehensive Cybersecurity Strategy and Performing Effective Oversight; and How ChatGPT Hijacks Democracy.

Subjects: AI, Cybercrime, Cybersecurity, Legal Research, Privacy, Social Media

What social media regulation could look like: Think of pipelines, not utilities

Elon Musk’s takeover of Twitter, and his controversial statements and decisions as its owner, have fueled a new wave of calls for regulating social media companies. Elected officials and policy scholars have argued for years that companies like Twitter and Facebook – now Meta – have immense power over public discussions and can use that power to elevate some views and suppress others. Critics also accuse the companies of failing to protect users’ personal data and downplaying harmful impacts of using social media. As an economist who studies the regulation of utilities such as electricity, gas and water, Theodore Kury, Director of Energy Studies at the University of Florida’s Public Utility Research Center, wonders what that regulation would look like. There are many regulatory models in use around the world, but few seem to fit the realities of social media. However, observing how these models work can provide valuable insights.

Subjects: Congress, Economy, Legal Research, Legislative, Social Media

Pete Recommends – Weekly highlights on cyber security issues, December 31, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to Wipe a Computer Clean of Personal Data; AI paper mills and image generation require a coordinated response from academic publishers; US House boots TikTok from government phones; and How to Use ChatGPT and Still Be a Good Person.

Subjects: AI, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Financial System, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, December 24, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Trojan House Source: The Surveillance Technology Oversight Project; Google Takes Gmail Security to the Next Level with Client-Side Encryption; Hunting for Mastodon Servers; and ByteDance [aka TikTok] employees spied on U.S. journalists, audit finds.

Subjects: Business Research, Cybercrime, Cyberlaw, Cybersecurity, Free Speech, KM, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 17, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Tricking antivirus solutions into deleting the wrong files on Windows; DOJ Seizes Dozens of Websites as Part of Cyberattack-for-Hire; TikTok pushes harmful content promoting eating disorders and self-harm into young users’ feeds; and FCC May Mandate Security Updates for Phones.

Subjects: Cybercrime, Cybersecurity, Food & Drug Law, Healthcare, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues, December 10, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Apple Commits to Encrypting iCloud, Drops Phone-Scanning Plans; Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds; Top EU court rules Google must delete inaccurate search results; and Who Is Collecting Data from Your Car?

Subjects: Cybercrime, Cybersecurity, Data Mining, Encryption, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 5 cybersecurity predictions for 2023; Cops Can Extract Data From 10,000 Different Car Models’ Infotainment Systems; A Peek Inside the FBI’s Unprecedented January 6 Geofence Dragnet; and Thinking about taking your computer to the repair shop? Be very afraid.

Subjects: Big Data, Congress, Cybercrime, Cybersecurity, Email, Email Security, KM, Privacy, Search Engines, Search Strategies, Social Media, Spyware, Travel

Elon Musk’s ‘hardcore’ management style: a case study in what not to do

Professor Libby Sander explains why as a case study in how to implement organisational change, Elon Musk’s actions at Twitter will go down as the gold standard in what not to do. Among other things, the evidence shows successful organisational change requires: a clear, compelling vision that is communicated effectively; employee participation; and fairness in the way change is implemented. Trust in leaders is also crucial. Change management never quite goes to plan. It’s hard to figure out whether Musk even has a plan at all.

Subjects: Communication Skills, Employment Law, Ethics, KM, Labor Law, Leadership, Management, Social Media, Technology Trends, Telecommuting

Pete Recommends – Weekly highlights on cyber security issues, November 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Google Settles 40 States’ Location Data Suit for $392 Million; FBI Alert: Watch Out for Subscription Renewal Scams; GAO Science & Tech Spotlight: Zero Trust Architecture; and Employee tracking: From your keystrokes to your emails, here’s what your employer can see.

Subjects: Civil Liberties, Communications, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Email, Freedom of Information, Legal Research, Search Engines, Social Media, Spyware