Category «KM»

Using Google Maps costs more than you think.

Jason Voiovich’s article focuses on a subject of recent attention by Congress, privacy groups and journalists, both in the U.S. and abroad. Tech Giants distribute services and applications that are free, but nevertheless track and monitor your mobile activities – collecting, aggregating and monetizing information about many facets of your daily life. In this case, Voiovich discusses Google Maps with the understanding that his evaluation is applicable to many other services and companies – all of whom are providing you with their “services” at no “cost” until such time as you understand the price you are really paying to use them.

Subjects: Civil Liberties, Internet Trends, Internet Use Policies, KM, Mobile Tech, Privacy, Search Engines, Technology Trends

While Putting Your Boots On – Fake News Detection Tools & Strategies

Genevieve Zook’s article is an actionable pathfinder to identifying inaccurate and false content published and shared online in multiple formats, including: news, social media activity, videos, photos, speeches and government documents. Zook references reliable tools and resources authored by librarians, educators, researchers and journalists that apply techniques critical to distinguishing the Currency, Relevance, Authority, Accuracy, and Purpose of information with which we interact daily.

Subjects: AI, KM, Legal Research

Making a difference with data driven decision-making

Amanda L. Brown, Esq., Legal Technology Consultant, Louisiana Legal Aid Navigator Project, Louisiana Bar Foundation – shares her experience on how using technology is an effective way to bridge the justice gap, and supports this position by demonstrating how data-driven decisions are used to help shine a light on where the needs are to ensure that efforts are then appropriately channeled from the start.

Subjects: Civil Liberties, Economy, Financial System, Government Resources, KM, Management, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues February 23, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google Quiz – Can you spot when you’re being phished?; Don’t be fooled by fake images and videos online; Study of Password Managers; and Your smartphone is tracking you: How to stop it from sharing data, ads.

Subjects: Blockchain, Cybersecurity, Email Security, KM, Privacy

LinkedIn 2019 Talent Trends: Soft Skills, Transparency and Trust

Global Industry Analyst Josh Bersin addresses critical employee workplace analysis validating people skills as highly rated employer HR and talent requirements. In professions for whom continuous delivery of outstanding customer services using collaborative and dynamic team efforts is the norm, Bersin’s data driven analysis is a benchmark to expand upon organizational mission, vision and values.

Subjects: AI, Communication Skills, KM, Leadership, Management

10 x 10: 100 Insightful KM Resources

KM expert Stan Garfield shares ten categories of KM resources, each with ten links to useful sources of knowledge about the field. The ten resources in each category are recommended starting points for those who want to learn more about KM. Each category heading is linked to a more extensive list for greater exploration.

Subjects: KM

The Bullshit Algorithm

Jason Voiovich goes directly to the heart of the matter with his statements that are a lessons learned guide that no researcher can afford to ignore – “Wasn’t the promise of data-driven, search engine and social media algorithms that they would amplify the truth and protect us from misinformation by tapping the wisdom of crowds? The fact is that they do not. And cannot. Because that is not what they are designed to do. At the heart of every social media algorithm is a fatal flaw that values persuasion over facts. Social media platforms (as well as search engines) are not designed for truth. They are designed for popularity. They are bullshit engines.”

Subjects: Internet Resources, KM, Search Engines, Social Media

A Private Eye in The Library

Christopher Kenneally interviewed Marcy Phelps on his Copyright Clearance Center’s podcast series, Beyond the Book. A licensed private eye who earned her master’s degree in library and information science from the University of Denver, Marcy Phelps works for asset management firms, commodity pool operators, M&A professionals, and others. Her detective work combing through databases and other online data dumps helps build a definitive dossier documenting any litigation, bankruptcies, and regulatory actions that could raise unpleasant questions for investors and even uncover unsavory characters.

Subjects: Business Research, Competitive Intelligence, KM, Legal Research