Category «E-Discovery»

Long Tail. Fat Risk. Why You May Want to Rethink Your “Platform” Strategy. Right Now

Tech savant, innovator and prognosticator – Jason Voiovich: “How many times in #marketing, #innovation, and #product strategy do we find ourselves looking only at the upside? In our TAM calculations, how often do we subtract out the “negative market”​ to account for risks? I’ve been doing this for nearly 25 years, and I never did. I suspect you haven’t either. I’m not sure I would have seen this as an obvious next step had I not spent the last year exploring the dark side of #platform strategies from Amazon, Google, Facebook, and Twitter. It’s time to look at these business models holistically. “

Subjects: Big Data, Business Research, Competitive Intelligence, Data Mining, Economy, Information Management, KM, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues August 25, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google adding autocorrect to Gmail; You Can Finally See All Info Facebook Collected About You From Other Websites; Just Security Launches the Russia Investigation Congressional Clearinghouse; and In New Facebook Effort, Humans Will Help Curate Your News Stories.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Data Mining, Email, Government Resources, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues July 13, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Fake News Could Lead to Real War; Researchers detail privacy-related legal, ethical challenges with satellite data Firefox 68 arrives with darker reader view, recommended extensions, IT customizations; ICE, FBI use state driver’s license photos for facial-recognition scans; and Google tracks all Gmail account purchases, even if emails are deleted.

Subjects: Civil Liberties, Cybersecurity, Data Mining, E-Government, Email, Email Security, Privacy, Search Engines, Search Strategies, Social Media

Terms, Tags, and Classification

It is helpful to classify documents or other content items to make them easier to find later. Searching the full text alone can retrieve inaccurate results or miss appropriate documents containing different words from the words entered into a search box. A document or content management system may include features for tagging, keywords, categories, indexing, etc. Taxonomist Heather Hedden identifies the difference between these elements to facilitate the implementation of more effective knowledge and content management.

Subjects: Business Research, Case Management, Competitive Intelligence, E-Discovery, Information Architecture, Information Mapping, KM

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies

Text Analysis Systems Mine Workplace Emails to Measure Staff Sentiments

Giving the processes of observation, analysis and change at the enterprise level a modern spin, is a fascinating new article in the September 2018 issue of The Atlantic, titled What Your Boss Could Learn by Reading the Whole Company’s Emails, by Frank Partnoy. Alan Rothmam summarizes and annotates this article that raises timely and significant issues around privacy, data mining and organizational management. Rothman concludes his review by posing important questions concerning the impact of text analysis data on executive training and development and on employee performance.

Subjects: AI, Data Mining, Email, Employment Law, KM, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues September 1 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlights of this week’s column: Woman Sues Border Agents to Make Them Return Data They Seized From Her Phone – and How Yahoo Is Mining For Gold in Your Junk Mail.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Data Mining, E-Commerce, Email, Government Resources, Privacy

Pete Recommends – Weekly highlights on cyber security issues July 7 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Please note these entries for actionable information that is valuable to multiple sectors (law, finance, government) – New survey shows executives heavily underestimate cybersecurity threats and Entity resolution is big business. There are more than 50 firms that sell some kind of service based on this.

Subjects: Blockchain, Cybercrime, Cybersecurity, Data Mining, Economy, Privacy, Social Media

Stagnation And The Legal Industry (Part 2) What Real Transformative Change Could Look Like

In his article Ken Grady describes one possible future for the legal services that embodies radical transformation. He bases this new paradigm on Elon Musk’s premise: the only things unchangeable are the laws of nature. In the case of your law practice this means that regulations, custom, habits, and processes and procedures are all the focus of actionable change. Grady suggests specific ways that the innovative use of current technology and how you approach your work and client services can effectively and positively impact the not too distant future of your profession.

Subjects: AI, Case Management, E-Discovery, KM, Law Firm Marketing, Legal Profession, Legal Research, Legal Technology

Search Warrant Issued For Amazon Echo Data

An Amazon Echo device is the subject of a prosecutor’s search warrant related to an Arkansas murder case. Nicole Black illuminates how such devices are complicating issues related to consumer privacy and vendor responses to search warrants. The ubiquity of Internet of Things (IoT) devices in homes will no doubt result in more warrants for the data they collect.

Subjects: Criminal Law, Discovery, Gadgets, Legal Research, Privacy