Banks should brace for impact: The Big Techs are coming!

Data, BI & Analytics expert Siraj Patel discusses the global financial services and products industry in the context of the urgency for existing business models to adapt and innovate in this time of disintermediation, product un-bundling and marketplaces that offer customer rapidly changing banking options.

Subjects: AI, Blockchain, Business Research, Economy

Library Acquisition Patterns: Preliminary Findings

Katherine Daniel, Joseph J. Esposito, Roger C. Schonfeld: Several years ago, we set out to better understand how both library acquisition practices and the distribution patterns of publishers and vendors were evolving over time. Within the academic publishing community, there is a sense that academic libraries are acquiring fewer and fewer books and that university presses are struggling amid declining sales. The latter may certainly be true—a recent UK study found that between 2005 and 2014, retail sales of academic books dropped by 13 percent—but what if the academic libraries that constitute part of that market were in reality not making fewer purchases? As new vendors and acquisition methods disrupt customary means of acquiring books, Joseph Esposito, Ithaka S+R’s frequent collaborator and consultant, was inspired to ask whether book sales were actually depressed, or if they only appeared to be because academic libraries were bypassing the traditional wholesale vendors whose metrics are used by university presses to assess sales to libraries for companies like Amazon.

Subjects: E-Commerce, Electronic Subscriptions, Information Management, Libraries & Librarians, Reference Resources

Pete Recommends – Weekly highlights on cyber security issues August 18 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlight of this week’s column: AP Exclusive: Google tracks your movements, like it or not; and Hackers can steal data from the enterprise using only a fax number. Although many assume fax machines are no longer in general use, think about your doctors and hospitals – they all continue to use them, as do many states, localities, the federal government, and courts.

Subjects: Congress, Cybercrime, Cybersecurity, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues August 11 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlights of this week’s column: As Russians hack the US grid, a look at what’s needed to protect it; and DARPA is racing against time to develop a tool that can spot ‘deepfakes’.

Subjects: AI, Cybercrime, Cybersecurity, Energy, Privacy

Pete Recommends – Weekly highlights on cyber security issues August 5 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlight of this week’s column: the FBI Releases Article on Securing the Internet of Things and Surprising Things the Government Knows About Americans.

Subjects: Computer Security, Cybercrime, Cybersecurity, Energy, Privacy

The 6 Types Of Cyber Attacks To Protect Against In 2018

Lizzie Kardon’s article is a timely guide to the different methods by which cyber attacks are launched and the tools used to deliver them. As the goals and objectives for such attacks differ, it is critical to employ accurate and effective strategic and tactical processes to prevent and to repel attacks that are steadily increasing as the Internet of Things (IoT) expands in arenas that span work, home, government, social media, healthcare and beyond.

Subjects: Computer Security, Cybercrime, Cybersecurity

Pete Recommends – Weekly highlights on cyber security issues July 28 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlight of this week’s column: the Supreme Court struggles to define ‘searches’ as technology changes, and how Google employees avoid phishing attempts with a $20 YubiKey security key.

Subjects: Computer Security, Cybersecurity, Email Security, Healthcare, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues July 22 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – a highlight of this week’s column is – Surveillance and Legal Research Providers: What You Need to Know

Subjects: Cybercrime, Cybersecurity, Ethics, Government Resources, Legal Research, Privacy, Social Media

Web Guide for the New Economy 2018

This new comprehensive guide to reliable and wide ranging resources on the New Economy by Marcus Zillman provides researchers who focus on law, finance and business sectors with many options from which to choose specific to sources of data, analytical information, statistics and knowledge published by the federal government, corporations, NGOs, nonprofits and subject matter experts as well as publishers. Zillman also includes Open Data Sets and databases that are available to the public.

Subjects: Big Data, Business Research, Competitive Intelligence, Economy, Financial System, Internet Resources - Web Links, Legal Research

The Practice Of Law, Theory, And Our Mess

Ken Grady discusses how the lack of a theory supporting the delivery of legal services has contributed to “a mess” in respect to the goal of achieving organizational operational excellence.

Subjects: KM, Law Firm Marketing
CLOSE
CLOSE