Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Internet

Shifting Gears: Gearing Up to Get into the Flow, Second Edition

OCLC – “In 2007, directors, administrators and curators of special collections in libraries, archives and museums came together for a forum—Digitization Matters: Breaking Through the Barriers—to discuss how to advance digitization of primary sources, in light of efforts at the time toward mass digitization of books. The report Shifting Gears: Gearing Up to Get into… Continue Reading

Examining the Alternative Media Ecosystem through Production of Alternative Narratives of Mass Shooting Events on Twitter

Examining the Alternative Media Ecosystem through the Production of Alternative Narratives of Mass Shooting Events on Twitter, Kate Starbird, University of Washington, HCDE. kstarbi@uw.edu “This research explores the alternative media ecosystem through a Twitter lens. Over a ten-month period, we collected tweets related to alternative narratives—e.g. conspiracy theories—of mass shooting events. We utilized tweeted URLs… Continue Reading

Schema.org 3.3 released

schema blog: “Schema.org 3.3 has been released. As always, the release was prepared, debated and finalized by the schema.org community group, and features a range of additions, adjustments, bugfixes and clarifications to improve the expressiveness and usability of our schemas. See the release notes for full details, but of particular note are some changes made… Continue Reading

The New British Library Research Data Strategy

British Library Digital Scholarship Blog: “With the support of a Research Data Strategy since 2010, the Library has been active in services for research data for a number of years. This work has included European-funded projects such as ODE, ODIN and THOR; Providing the DataCite UK service and involvement in other activities such as data… Continue Reading

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic, Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster, arXiv:1708.05044 [cs.CR] “The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home. Many smart home devices have always-on sensors… Continue Reading

CRS Report – Domestic Terrorism: An Overview

Via FAS – Domestic Terrorism: An Overview, Jerome P. Bjelopera, Specialist in Organized Crime and Terrorism. August 21, 2017. “The emphasis of counter terrorism policy in the United States since Al Qaeda’s attacks of September 11, 2001 (9/11) has been on jihadist terrorism. However, in the last decade, domestic terrorists—people who commit crimes within the… Continue Reading

New Yorker – Who Owns the Internet?

Who Owns the Internet? What Big Tech’s monopoly powers mean for our culture. “…Today, just about everybody uses it for everything. Even as the Web has grown, however, it has narrowed. Google now controls nearly ninety per cent of search advertising, Facebook almost eighty per cent of mobile social traffic, and Amazon about seventy-five per… Continue Reading

International Privacy Experts Adopt Statements on E-Learning, Intelligence Gathering

EPIC – “The International Working Group on Data Protection in Telecommunications has adopted new recommendations to improve privacy and security standards for e-learning platforms and government intelligence gathering. The Berlin-based Working Group includes Data Protection Authorities and experts who work together to address emerging privacy challenges. The Working Paper on “E-Learning Platforms” highlights privacy risks… Continue Reading

Library Guides for Detecting Fake News – AALL Spectrum July 2017

Genevieve Zook [excerpted from her article] – JULY/AUGUST 2017 | AALL SPECTRUM 23 American Library Association bit.ly/JA17ALA Bowdoin College Library bit.ly/JA17Bowdoin Harvard Library bit.ly/JA17Harvard Hillsborough Community College Libraries bit.ly/JA17Hills Indiana University East bit.ly/JA17IU Pace University Library bit.ly/JA17Pace Penn State University Libraries bit.ly/JA17Pace http://bit.ly/JA17Pace The Public Library of Albuquerque and Bernalillo County bit.ly/JA17 Toronto Public Library… Continue Reading

Those supposed;y secure passwords you routinely create are not secure at all

WSJ.com – “…Back in 2003, as a midlevel manager at the National Institute of Standards and Technology, Bill Burr was the author of “NIST Special Publication 800-63. Appendix A.” [this is the 2017 version] The 8-page primer advised people to protect their accounts by inventing awkward new words rife with obscure characters, capital letters and… Continue Reading

Report – Disruptive innovation in the courts

“The Joint Technology Committee (JTC) has released a new Resource Bulletin titled “Courts Disrupted.” This paper takes a captivating look at today’s fast-changing world of innovation and public expectations. Recognizing courts will not remain untouched by disruptive innovation, the paper encourages embracing rather than resisting the opportunities to improve business processes and make justice more… Continue Reading

Ad Week – Most and Least Trusted Brands in News

People have a lot of faith in Reuters, but not as much in Breitbart:”…A study of close to 9,000 people found that the most trusted source of news is The Economist, while the Occupy Democrats organization was the least trusted source. The University of Missouri recently ran a questionnaire distributed by 28 newsrooms across the… Continue Reading