Author and blogger Dave Pollard addresses the incendiary global war of lies vs. truth, reminiscent of the MAD Magazine cartoon Spy Vs. Spy for those who of us who can recall the scenarios they played which remain eerily prescient. Pollard posits the most effective way to win and retain political power is by seizing the hearts and minds of citizens through a mix of propaganda, mis- and disinformation, and censorship. He continues, this is especially true now, living with a ubiquitous and unceasing firehose of often-conflicting information, and exploitative for-profit “social” media controlled by a handful of dimwitted and unstable western oligarchs.
Rick Anderson is University Librarian at Brigham Young University. His commentary addresses timely, thoughtful and critical conversations and knowledge sharing around the issues of censorship, book banning, library ethics and professional responsibility across communities.
The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.
Ed Summers, librarian, metadata expert, teacher, and computational expert, delivers an insighful lesson on the Persistent Uniform Resource Locator. PURLs were developed to make URLs more resilient and persistent over time. You could put a PURL into a catalog record and if the URL it pointed to needed to change you changed the redirect on the PURL server, and all the places that pointed to the PURL didn’t need to change. It was a beautifully simple idea, and has influenced other approaches like DOI and Handle. But this simplicity depends on a commitment to keeping the PURL up to date.
Librarians, researchers, journalists, teachers and students are continually confronted with what can be described as a kind of information miasma when using online sites, databases, resources, images and social media. No sector or discipline is immune to misinformation, disinformation, hoaxes, lack of data quality, and biased research. This guide by Marcus Zillman highlights actionable resources to evaluate and identify online malfeasance, as well as sources to verify information and data quality that is critical to our professions. These two efforts often intersect, and require vigilance and continuing education respective to effectively confronting the challenges they present.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Five highlights from this week: An introduction to U.S. data compliance laws; Companies ditching VPNs for zero trust architectures to secure hybrid workplaces; Research finds US adults have context-specific views on biometric technology use; Apple iOS privacy settings to change now; and Mozilla has released a new platform for privacy-focused email communications.
Trump wants the National Archives to keep his papers away from investigators – post-Watergate laws and executive orders may not let him
Professor Shannon Bow O’Brien is a presidency scholar who focuses upon rhetoric. She discusses how the National Archives usually goes on with its work with little attention, but that is now at the center of a political fight about the public’s access to the papers of former President Donald Trump.
Data privacy laws in the US protect profit but prevent sharing data for public good – people want the opposite
Cason Schmit, Brian N. Larson and Hye-Chung Kum are faculty at the school of public health and the law school at Texas A&M University with expertise in health information regulation, data science and online contracts. U.S. data protection laws often widely permit using data for profit but are more restrictive of socially beneficial uses. They wanted to ask a simple question: Do U.S. privacy laws actually protect data in the ways that Americans want? Using a national survey, we found that the public’s preferences are inconsistent with the restrictions imposed by U.S. privacy laws.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Here’s How Amazon Third-Party Sellers Reportedly Hound Customers Who Leave Bad Reviews; Microsoft Edge’s ‘Super Duper Secure Mode’ Does What It Says; The Ethics of Data: Anonymity Vs Analytics; and Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises.
This article by Mary Ellen Bates is an excerpt from her recent presentation “The Strategic Value of Copyright Licensing Solutions,” to which she also provides a video link. Bates discusses ways published information is being used throughout organizations that you may not have considered, and the impact on copyright compliance.