LLRX New Issue – November 2019

Articles and Columns for November 2019

  • 2020 Guide to Web Data Extractors – This guide by Marcus P. Zillman is a comprehensive listing of web data extractors, screen, web scraping and crawling sources and sites for the Internet and the Deep Web. These sources are useful for professionals who focus on competitive intelligence, business intelligence and analysis, knowledge management and research that requires collecting, reviewing, monitoring and tracking data, metadata and text.
  • Why Do Experienced Women Lawyers Leave Biglaw? Why Do We Care?Carolyn Elefant, Energy Law Entrepreneur, Eminent Domain Lawyer and Data Scientist, offers insights in response to the ABA’s November 2019 report on gender equality at biglaw. Among other issues, Elefant focuses on the ABA’s persistent failure to recognize the role of women-owned law firms to advancing gender equality and diversity in the profession.
  • Who Stole My Face? The Risks Of Law Enforcement Use Of Facial Recognition Software – Lawyer and Legal Technology Evangelist Nicole L. Black discusses the “reckless social experiment” that facial surveillance represents across all aspects of life in America. It is the norm on social media, in air travel, as a mechanism for state, local and federal governments to identify location and means of travel (car, train, bus), in banking and financial transactions (smile next time you use your ATM), and as a security feature to unlock your phone, to name but some of its applications. You cannot opt-out of the use of your data nor the multifaceted ways that it impacts your diminishing privacy and civil liberties.
  • Website privacy options aren’t much of a choice since they’re hard to find and use – Hana Habib and Lorrie Cranor of Carnegie Mellon University discuss how many sites offer the ability to ‘opt out’ of targeted advertisements, and identify why doing so isn’t easy. They advocate for simplifying and standardizing opt-outs to help improve privacy on the web.
  • Taxonomy 101: Presented at Taxonomy Boot Camp 2019 – This presentation delivers a detailed understanding of taxonomy definitions, taxonomy value (ROI), and taxonomy design methodologies and approaches. It was originally delivered by Zach Wahl and Tatiana Cakici of Enterprise Knowledge at Taxonomy Boot Camp 2019 in Washington, DC.
  • Pete Recommends – Weekly highlights on cyber security issues, November 23, 2019Four highlights from this week: Stop Using Public USB Ports to Charge Your Phone; Upgrading Your Phone? 4 Things You Should Do First; Who Stole My Face? The Risks Of Law Enforcement Use Of Facial Recognition Software; and How to Lock Down Your Health and Fitness Data.
  • Pete Recommends – Weekly highlights on cyber security issues, November 15, 2019Four highlights from this week: Google is collecting health data on millions of Americans; How to Protect Yourself From Unethical or Illegal Spying; Everything you need to know about Google Reverse Image Search; and Federal Court Rules Suspicionless Searches of Travelers’ Phones and Laptops Unconstitutional.
  • Pete Recommends – Weekly highlights on cyber security issues, November 9, 2019Four highlights from this week: What Would Happen If the Internet Went Down … Forever?; Resources for Measuring Cybersecurity; For Better or Worse, Blockchain Birth Certificates Are Officially Here; and Apple Warns Older iPhones May Stop Working Sunday Without Software Upgrade.
  • Pete Recommends – Weekly highlights on cyber security issues, November 2, 2019Four highlights from this week: Americans and Digital Knowledge; 10 Tips to Avoid Leaving Tracks Around the Internet; Proving You’re You: How Federal Agencies Can Improve Online Verification; and New Report: “World’s First Deepfake Audit Counts Videos and Tools on the Open Web”.

LLRX.com® – the free web journal on law, technology, knowledge discovery and research for Librarians, Lawyers, Researchers, Academics, and Journalists. Founded in 1996.

Subjects: KM

Pete Recommends – Weekly highlights on cyber security issues November 30, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Go Google free: We pick privacy-friendly alternatives to every Google service; Alexa, Siri and other voice systems are raising security worries; Canada’s use of Huawei 5G would hamper its access to U.S. intelligence – U.S. official; Law enforcement can plunder DNA profile database, judge rules.

Subjects: Big Data, Civil Liberties, Cybercrime, Cybersecurity, Social Media

2020 Guide to Web Data Extractors

This guide by Marcus P. Zillman is a comprehensive listing of web data extractors, screen, web scraping and crawling sources and sites for the Internet and the Deep Web. These sources are useful for professionals who focus on competitive intelligence, business intelligence and analysis, knowledge management and research that requires collecting, reviewing, monitoring and tracking data, metadata and text.

Subjects: AI, Big Data, KM, Search Engines, Search Strategies, Social Media

Why Do Experienced Women Lawyers Leave Biglaw? Why Do We Care?

Carolyn Elefant, Energy Law Entrepreneur, Eminent Domain Lawyer and Data Scientist, offers insights in response to the ABA’s November 2019 report on gender equality at biglaw. Among other issues, Elefant focuses on the ABA’s persistent failure to recognize the role of women-owned law firms to advancing gender equality and diversity in the profession.

Subjects: KM, Law Firm Marketing, Leadership, Legal Marketing, Legal Profession, Management

Pete Recommends – Weekly highlights on cyber security issues November 23, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Stop Using Public USB Ports to Charge Your Phone; Upgrading Your Phone? 4 Things You Should Do First; Who Stole My Face? The Risks Of Law Enforcement Use Of Facial Recognition Software; and How to Lock Down Your Health and Fitness Data.

Subjects: AI, Big Data, Congress, Cybercrime, Cybersecurity, Healthcare, Legislative, Mobile Tech, Pornography, Privacy, Search Engines

Who Stole My Face? The Risks Of Law Enforcement Use Of Facial Recognition Software

Lawyer and Legal Technology Evangelist Nicole L. Black discusses the “reckless social experiment” that facial surveillance represents across all aspects of life in America. It is the norm on social media, in air travel, as a mechanism for state, local and federal governments to identify location and means of travel (car, train, bus), in banking and financial transactions (smile next time you use your ATM), and as a security feature to unlock your phone, to name but some of its applications. You cannot opt-out of the use of your data nor the multifaceted ways that it impacts your diminishing privacy and civil liberties.

Subjects: AI, Civil Liberties, Congress, Cyberlaw, Legal Research, Privacy, Social Media

Website privacy options aren’t much of a choice since they’re hard to find and use

Hana Habib and Lorrie Cranor of Carnegie Mellon University discuss how many sites offer the ability to ‘opt out’ of targeted advertisements, and identify why doing so isn’t easy. They advocate for simplifying and standardizing opt-outs to help improve privacy on the web.

Subjects: Cybersecurity, KM, Legal Research, Privacy, Social Media, Technology Trends

Pete Recommends Weekly highlights on cyber security issues November 15, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google is collecting health data on millions of Americans; How to Protect Yourself From Unethical or Illegal Spying; Everything you need to know about Google Reverse Image Search; and Federal Court Rules Suspicionless Searches of Travelers’ Phones and Laptops Unconstitutional.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Healthcare, Privacy

Pete Recommends – Weekly highlights on cyber security issues, November 9, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: What Would Happen If the Internet Went Down … Forever?; Resources for Measuring Cybersecurity; For Better or Worse, Blockchain Birth Certificates Are Officially Here; and Apple Warns Older iPhones May Stop Working Sunday Without Software Upgrade.

Subjects: Communications, Computer Security, Cybercrime, Cybersecurity, Economy, Financial System, Government Resources, Health, Privacy, RSS Newsfeeds