A survey of over 17,000 people indicates only half of us are willing to trust AI at work

Professor Nicole Gillespie, and Research Fellows Caitlin Curtis, Javad Pool and Steven Lockey, discuss their new 17-country study involving over 17,000 people reveals how much and in what ways we trust AI in the workplace, how we view the risks and benefits, and what is expected for AI to be trusted. They find that only one in two employees are willing to trust AI at work. Their attitude depends on their role, what country they live in, and what the AI is used for. However, people across the globe are nearly unanimous in their expectations of what needs to be in place for AI to be trusted.

Subjects: AI, Information Management, Software, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, March 25, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Canceling subscriptions is notoriously difficult. A proposed FTC rule wants to change that; Analysts share 8 ChatGPT security predictions for 2023; It’s impossible to review security cameras in the age of breaches and ransomware; and TikTok parent ByteDance owns a bunch of other popular apps. Seems relevant!

Subjects: AI, Civil Liberties, Computer Security, Cybercrime, Cybersecurity, Economy, Privacy, Social Media, Technology Trends

Algorithms are moulding and shaping our politics. Here’s how to avoid being gamed

In a recent paper, Prof. Chantelle Gray coined the term “algopopulism”: algorithmically aided politics. The political content in our personal feeds not only represents the world and politics to us. It creates new, sometimes “alternative”, realities. It changes how we encounter and understand politics and even how we understand reality itself.

Subjects: AI, Conflicts, Education, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues, March 18, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 9 Tips to Protect Your Smartphone from Hackers; NSA offers new tips on zero trust and identity; FCC Adopts New Rules to Block Unwanted Robotexts and Robocalls; and FDIC fails to establish effective controls to secure sensitive data, report says.

Subjects: Cybercrime, Cybersecurity, Economy, Email Security, Financial System, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, March 11, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: What to Do When Your Boss Is Spying on You; Biden Administration’s Cybersecurity Strategy Takes Aim at Hackers; Your user data can be the prosecution’s star witness; and Browser Security report reveals major online security threats.

Subjects: AI, Cryptocurrency, Cybercrime, Financial System, Government Resources, Privacy

Pete Recommends – Weekly highlights on cyber security issues, March 4, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Global internet connectivity at risk from climate disasters; The Insecurity of Photo Cropping; These 26 words ‘created the internet.’ Now the Supreme Court may be coming for them; and NSA Releases Best Practices For Securing Your Home Network.

Subjects: AI, Climate Change, Computer Security, Cryptocurrency, Cybercrime, Cybersecurity, Legal Research, Privacy, RSS Newsfeeds

LLRX February 2023 Issue

Articles and Columns for February 2023 The expanding role of technology in the law firm business model – The premise of this article by COO and legal technologist Kenneth Jones is that individual capabilities and excellence (either legal or technical) standing alone are not enough to ensure long-term, sustainable success. No superstar technologist or lawyer is …

Subjects: KM

The expanding role of technology in the law firm business model

The premise of this article by COO and legal technologist Kenneth Jones is that individual capabilities and excellence (either legal or technical) standing alone are not enough to ensure long-term, sustainable success. No superstar technologist or lawyer is equipped to do it all, as there are too many specialties and functional roles which need to be filled. Rather, a better approach is to construct team-based, cross-functional units that offer greater operational efficiency while building in layers of redundancy that reduce the potential for surprises, errors, or disruption. This comprehensive and actionable guide validates deploying the cross-functional team approach across the enterprise.

Subjects: Information Management, KM, Leadership, Legal Profession, Legal Technology, Management, Team Building

Satellite data: The other type of smartphone data you might not know about

Subject matter experts Tommy Cooke, Alicia Sabatino, Benjamin Muller and Kirstie Ball used critical code and documentary research methods to identify that raw satellite location measurement data are perpetually created in our devices all the time. Because satellite data are building blocks used by our phones to determine where we are, they don’t always get turned off — nor are they collected and treated the same way as location data. The collection and use of these data are a significant risk to our privacy.

Subjects: Big Data, Data Mining, Legal Research, Mobile Technology, Privacy