Online Research Browsers 2019

Marcus Zillman’s guide highlights multifaceted browser alternatives to mainstream search tools that researchers may regularly use by default. There are many reliable yet underutilized applications that facilitate access to and discovery of subject matter specific documents and sources. Free applications included here also offer collaboration tools, resources to build and manage repositories, to employ data visualization, to create and apply metadata management, citations, bibliographies, document discovery and data relationship analysis.

Subjects: Business Research, KM, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues May 11, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The Challenges of Implanted Cardiac Device Security; Scammers Exploit Home Rental Listings With ‘Let Yourself In’ Link; New Rules On E-Evidence Could Streamline Criminal Investigations in the EU; and a Parental Advisory: Dating Apps

Subjects: Computer Security, Congress, Cybercrime, Cybersecurity, Government Resources, Internet Dating, Legislative, Privacy

Pete Recommends – Weekly highlights on cyber security issues May 5, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google to roll out auto-delete controls for location history and activity data; Rights groups challenge warrantless cellphone searches at U.S. border; U.S. cyber spies unmasked many more American identities in 2018; and Spies, Lies, and Algorithms.

Subjects: AI, Government Resources, Information Management, KM, Legal Research, Mobile Technology, Privacy, Search Engines, Social Media, Technology Trends

Manage Information Overload Resources 2019

As we are challenged each day to expertly respond to an overwhelming amount of information, much of it not relevant to our requirements, it is a major undertaking to exercise our choices skillfully as well as to balance our knowledge resources to best serve our objectives. Marcus Zillman’s guide offers both broader resources on how to manage information overload, as well as sources, tools and techniques to facilitate research productivity.

Subjects: Internet Resources, Internet Resources - Web Links, KM, Legal Research, Technology Trends

Is it a “Good” Case? Can You Rely on BCite, KeyCite, and Shepard’s to Tell You?

Kristina L. Niedringhaus calls our attention to a recent article by Paul Heller whose research identified 357 citing relationships that one or more of the three major citators labeled as negative. “Out of these, all three citators agree that there was negative treatment only 53 times. This means that in 85% of these citing relationships, the three citators do not agree on whether there was negative treatment.”

Subjects: Citators, KM, Legal Research, Legal Research Training, Product Reviews, United States Law

Pete Recommends – Weekly highlights on cyber security issues April 28, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: ‘They think they are above the law’: the firms that own America’s voting system; Why You Should Use a Password Manager; Cyberspies Hijacked the Internet Domains of Entire Countries; and Huawei: Chinese spies or trustworthy 5G industry partner?

Subjects: Cybersecurity, Mobile Technology, Privacy, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues April 20, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: WikiLeaks set 21st century model for cyber-leak journalism; Your car is watching you. Who owns the data?; Facebook, lose my digits: Here’s how to unlist your phone number; and What e-books at the library mean for your privacy.

Subjects: Cybercrime, Cybersecurity, E-Books, Health, Internet Trends, KM, Libraries & Librarians, Privacy, Social Media

Legal Research: Resources for Reviewing Employment Policies on Harassment

This timely guide by Genevieve Zook, reference & instructional services librarian at the U.W. Law Library, addresses the significant issue of sexual harassment in the workplace. Employers are increasingly reviewing sexual harassment policies and procedures in their organizations, and Zook’s comprehensive guide is an actionable resource with which to effectively engage and implement positive change.

Subjects: Civil Liberties, Education, Internet Resources, Legal Research, Online Legal Research Services, Reference Resources, Search Strategies

Opinion – How a national library endowment could help Philadelphia

David Rothman continues his advocacy for a national library endowment to help K-12 and public libraries in Philadelphia, and around the country. His argument in favor of such an endowment is especially resonant in light of the recent college entrance cheating and bribery scams involving the children of wealthy parents and celebrities.

Subjects: Economy, Education, Libraries & Librarians, Reference Services