Category «Social Media»

The Russian invasion shows how digital technologies have become involved in all aspects of war

Since Russia invaded Ukraine, we keep hearing that this war is like no other; because Ukrainians have cellphones and access to social media platforms, the traditional control of information and propaganda cannot work and people are able to see through the fog of war. For these communications scholars and historians, Professors Katharina Niemeyer, Dominique Trudel, Heidi J. S. Tworek, Maria Silina and Svitlana Matviyenko, it is important to add nuance to such claims. The question is not so much what is “new” in this war, but rather to understand its specific media dynamics. One important facet of this war is the interplay between old and new media — the many loops that go from Twitter to television to TikTok, and back and forth.

Subjects: AI, Communications, KM, Social Media, Technology Trends

Ukraine doomscrolling can harm your cognition as well as your mood – here’s what to do about it

What use are we in helping to solve difficult global challenges if we’re so depressed and cognitively depleted that we can’t think of the best actions to take? Ukraine doomscrolling can harm your cognition as well as your mood. Professors Barbara Jacquelyn Sahakian, Christelle Langley, Chun Shen and Jianfeng Feng describe their research findings on what to do about it.

Subjects: Healthcare, KM, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 20, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report: Cybersecurity teams need nearly 100 days to develop threat defenses; Russian General Killed After Using Unsecured Phone; A sustainable look at secure device destruction; and Ukraine reportedly adopts Clearview AI to track Russian invaders.

Subjects: Blockchain, Business Research, Cybersecurity, Economy, Financial System, Privacy, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 2022 Guide to Internet Privacy Resources and Tools; Russia creates its own TLS certificate authority to bypass sanctions; Twitter quietly launches Tor service in the face of Russian censorship; Decentralized identity using blockchain.

Subjects: Blockchain, Cybersecurity, Economy, Financial System, Health, Healthcare, Legal Research, Privacy, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 6, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to make software supply chains resilient to cyber attacks; Russian Invasion Highlights Growing Importance of Open Source Intelligence; Cybersecurity: Internet Architecture is Considered Resilient, but Federal Agencies Continue to Address Risks; and Senate passes major cybersecurity legislation to force reporting of cyberattacks and ransomware.

Subjects: Cybercrime, Cybersecurity, Open Source, Social Media

Using News and Social Media for Finding Financial Assets – 5 Top Tips

Private investigator Marcy Phelps searches social media and online news for clients on a daily basis and recommends specific sources as useful for asset investigations. Phelps notes that not everything will show up in public records, and news and social media research helps fill in the gaps. Phelps shares a few examples of useful sources and strategies that made a difference for clients.

Subjects: Business Research, Competitive Intelligence, Search Strategies, Social Media

Pete Recommends Weekly highlights on cyber security issues, February 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: The MY2022 app is a required download for Olympians and looks like a security nightmare; The country inoculating against disinformation; The IRS Says It Will Ditch ID.me’s Facial Recognition; How Phishers Are Slinking Their Links Into LinkedIn; and Health Sites Let Ads Track Visitors Without Telling Them.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, E-Government, Government Resources, Healthcare, Legal Research, Privacy, Social Media, Spyware

Pete Recommends Weekly highlights on cyber security issues, January 29, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: How ID.me’s Face Recognition for IRS, Unemployment Works; A Former Hacker’s Guide to Boosting Your Online Security; White House clamps down on federal cybersecurity after big hacks; How to Download Everything Amazon Knows About You (It’s a Lot); and Teamwork, trust and threat sharing key to cybersecurity.

Subjects: AI, Communications, Cybercrime, Cybersecurity, Data Mining, E-Commerce, Ethics, Free Speech, Freedom of Information, Government Resources, KM, Legal Research, Privacy, Search Engines, Social Media, Telecommuting

Information Quality Resources 2022

Librarians, researchers, journalists, teachers and students are continually confronted with what can be described as a kind of information miasma when using online sites, databases, resources, images and social media. No sector or discipline is immune to misinformation, disinformation, hoaxes, lack of data quality, and biased research. This guide by Marcus Zillman highlights actionable resources to evaluate and identify online malfeasance, as well as sources to verify information and data quality that is critical to our professions. These two efforts often intersect, and require vigilance and continuing education respective to effectively confronting the challenges they present.

Subjects: Big Data, Competitive Intelligence, Education, Information Management, Internet Resources - Web Links, KM, Libraries & Librarians, Reference Resources, Search Strategies, Social Media, Technology Trends, Viruses & Hoaxes