Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Fake News Could Lead to Real War; Researchers detail privacy-related legal, ethical challenges with satellite data Firefox 68 arrives with darker reader view, recommended extensions, IT customizations; ICE, FBI use state driver’s license photos for facial-recognition scans; and Google tracks all Gmail account purchases, even if emails are deleted.
It is helpful to classify documents or other content items to make them easier to find later. Searching the full text alone can retrieve inaccurate results or miss appropriate documents containing different words from the words entered into a search box. A document or content management system may include features for tagging, keywords, categories, indexing, etc. Taxonomist Heather Hedden identifies the difference between these elements to facilitate the implementation of more effective knowledge and content management.
How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.
Giving the processes of observation, analysis and change at the enterprise level a modern spin, is a fascinating new article in the September 2018 issue of The Atlantic, titled What Your Boss Could Learn by Reading the Whole Company’s Emails, by Frank Partnoy. Alan Rothmam summarizes and annotates this article that raises timely and significant issues around privacy, data mining and organizational management. Rothman concludes his review by posing important questions concerning the impact of text analysis data on executive training and development and on employee performance.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlights of this week’s column: Woman Sues Border Agents to Make Them Return Data They Seized From Her Phone – and How Yahoo Is Mining For Gold in Your Junk Mail.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Please note these entries for actionable information that is valuable to multiple sectors (law, finance, government) – New survey shows executives heavily underestimate cybersecurity threats and Entity resolution is big business. There are more than 50 firms that sell some kind of service based on this.
In his article Ken Grady describes one possible future for the legal services that embodies radical transformation. He bases this new paradigm on Elon Musk’s premise: the only things unchangeable are the laws of nature. In the case of your law practice this means that regulations, custom, habits, and processes and procedures are all the focus of actionable change. Grady suggests specific ways that the innovative use of current technology and how you approach your work and client services can effectively and positively impact the not too distant future of your profession.
An Amazon Echo device is the subject of a prosecutor’s search warrant related to an Arkansas murder case. Nicole Black illuminates how such devices are complicating issues related to consumer privacy and vendor responses to search warrants. The ubiquity of Internet of Things (IoT) devices in homes will no doubt result in more warrants for the data they collect.
Ron Friedmann discusses the potential, likely and unlikely impact of high profile disruptive technologies on Big Law – including Bid Data. blockchain, AI and bots.
Alan Rothman’s article is based on a TechCrunch.com posting, The Next Stop on the Road to Revolution is Ambient Intelligence. Rothman offers an insightful analysis on how the rapidly expanding universe of digital intelligent systems wired into our daily routines is becoming more ubiquitous, unavoidable and ambient each day.