Experts grade Facebook, TikTok, Twitter, YouTube on readiness to handle midterm election misinformation

Professors Dam Hee Kim, Anjana Susarla and Scott Shackelford are experts on social media. They were asked to grade how ready Facebook, TikTok, Twitter and YouTube are to handle the task of misinformation and disinformation in the upcoming election cycles. Social media companies have announced plans to deal with misinformation in the 2022 midterm elections, but the companies vary in their approaches and effectiveness and the result promises to be another jarring challenge to democracy in America.

Subjects: AI, Communication Skills, Internet Trends, KM, Legal Research, Social Media, Technology Trends

Citizens’ social media can provide an antidote to propaganda and disinformation

Robert W. Gehl, Ontario Research Chair of Digital Governance for Social Justice, York University, Canada raises an important issue about a recent Pew report on current state of digital media, news and right-wing propaganda. Gehl states the report misses a large number of alternative social media sites that actively and effectively oppose the right-wing propaganda. This distracts us from real-world solutions to the problems of online hate speech, disinformation and surveillance capitalism.

Subjects: Communication Skills, KM, Legal Research, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cybersecurity issues – October 22, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Weakness in Microsoft Office 365 Message Encryption could expose email contents; How Facebook Became the Internet’s Covid-19 Misinformation Hub; TX AG Ken Paxton Sues Google Over Facial Recognition in Photos; TikTok Parent ByteDance Planned To Use TikTok To Monitor The Physical Location Of Specific American Citizens; and Here’s 5 of the world’s riskiest connected devices.

Subjects: Cybersecurity, Privacy, Social Media

Pete Recommends – Weekly highlights on cybersecurity issues – October 15, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Uber Data Breach Conviction Shows Security Execs What Not to Do; Protect your privacy and your phone number with Firefox Relay; Pro-Russian hackers take credit for cyberattacks on U.S. airport; and Google Chrome Is the Least Secure Browser, Report Shows.

Subjects: Blockchain, Cryptocurrency, Cybersecurity, Privacy, Search Engines, Telecommuting, Travel

Pete Recommends – Weekly highlights on cybersecurity issues – October 8, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Google Only Tweaks Location History Description After Lawsuit; Your Router Is Collecting Data. Here’s What to Know, and How to Protect Your Privacy; Does Biometric Verification Violate Workers Rights?; and Russians dodging mobilization behind flourishing scam market.

Subjects: Cybersecurity, Economy, Legal Research

Pete Recommends – Weekly highlights on cybersecurity issues – October 2, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Google Rolls out ‘Results About You’ for Personal Info Removal; I Said No to Online Cookies. Websites Tracked Me Anyway; Bosses spying on you? Here’s the most disastrous truth about surveillance software; How does identity crime affect victims?; and Say Goodbye to VPNs.

Subjects: AI, Cybercrime, Cybersecurity, E-Commerce, Email, Privacy, Technology Trends, Telecommuting

LLRX September 2022 Issue

Articles and Columns for September 2022 Fenced-off culture, the privatized Internet, and why book publishers lean on a 30-year-old doctrine – The Internet Archive (IA) “is a non-profit digital library offering free universal access to books, movies & music, as well as 624 billion archived web pages.” The IA offers users unrestricted access to its …

Subjects: KM

Fenced-off culture, the privatized Internet, and why book publishers lean on a 30-year-old doctrine

The Internet Archive (IA) “is a non-profit digital library offering free universal access to books, movies & music, as well as 624 billion archived web pages.” The IA offers users unrestricted access to its expansive ecosystem of knowledge and educational resources from the public domain. Andy Oram, prolific author, editor, publisher, and technical expert on all aspects of computing, undertook an extensive examination of a game changing case, Hachette v. Internet Archive, that may dismantle this unique, invaluable digital library. In this article Oram examines what the publishers are trying to protect and why they have to wield a large and heavy cudgel to protect it. His inquiry leads to a look at how culture has been privatized as it has become digitized—an effect quite opposed to the hopes of most public advocates who maintain the view that the Internet and the World Wide Web should remain focused on public access, not private sector monetization.

Subjects: Archives, Congress, Copyright, E-Books, Internet Resources, KM, Legal Research, Legislative, Libraries & Librarians, Publishing & Publishers (Legal), Search Engines, United States Law, Virtual Library

After the Ivory Tower Falls: A Book Review

Among the main strengths of this important, highly readable book, says David H. Rothman, is its history of how we got into the mess in the first place. We blew our chance by not making higher education more of a tax-supported public good with academic values prevailing over commercial ones. The GI Bill and other measures helped, but what if the aid had been even more extensive with far less reliance on the marketplace? Even elite Ivy schools got caught up in the mania—wildly overpaying administrators and indulging in ever-more-expensive dorms and gyms and other luxuries to compete for the students from well-off families most likely to donate. So much for the poor and middle class, even with scholarships. The result was that America squandered brainpower.

Subjects: Book Reviews, Economy, Education, Financial System, KM

What is proof-of-stake? A computer scientist explains a new way to make cryptocurrencies, NFTs and metaverse transactions

Prof. Scott Ruoti briefs us on yet another new component in Digital Ledger Technology. Proof-of-stake is a mechanism for achieving consensus on a blockchain. Blockchain is a technology that records transactions that can’t be deleted or altered. It’s a decentralized database, or ledger, that is under no one person or organization’s control. Since no one controls the database, consensus mechanisms, such as proof-of-stake, are needed to coordinate the operation of blockchain-based systems.

Subjects: Blockchain, Cryptocurrency, Economy, Energy, Financial System, Legal Research, Technology Trends