Identity Theft and Social Media Scares

March 7, 2012

Ah, The Culture of Fear is finally reaching social media. With search morphing from precision and recall to asking one’s closest online pals, fear and search may now become unlikely bed fellows.

I came across an interesting article today (while taking a break from browsing my social media accounts on my smartphone) titled, “Smartphone, Social Media Users at Risk for Identity Fraud.” According to the piece, smartphone owners and social media users have an increased risk of becoming a victim of identity theft because of a lack of adequate security settings. A recent report on identity fraud by Javelin Strategy and Research found that 7 percent of smartphone users were victims of identity fraud last year, compared to the 4.9 percent rate among the general population. The article tells us more:

Around 62 percent [of smartphone owners] said they don’t use a password or a pin code to lock their devices. About 32 percent admitted to saving log-in information on their devices. Social media and mobile behaviors made users more vulnerable to fraud, according to the report. Users of social networking services, such as LinkedIn, Google+, Facebook and Twitter, had the highest incidence of fraud. Consumers who actively engage with social media and use a smartphone were found to have a disproportionate rate of identity fraud than consumers who do not use in these services.

Because of GPS-enabled location data and personal information shared over these networks, users are putting themselves at risk. However, when it comes to sharing information on smartphones and social media, users’ fear may be misdirected and misinformed. It seems to me that a 2 percent increase in identity theft possibilities might not be the biggest of our problems.

Andrea Hayden, March 7, 2012

Sponsored by Pandia.com

LexisNexis Fails to Make the Leap

March 2, 2012

Leap Day is a bit odd for everyone. It just seems strange to have the 29th added to February every four years. However, for the most part, everyone assumes that Leap Day will cause no major problems. That was not the case for some law librarians who reported their findings in, “Lexis Litigation Lists Lag on LeapDay.”

“While trying to run a Litigant Strategic Profile from LexisNexis’ CourtLink system, we kept noticing that the reports simply wouldn’t run. We contacted Lexis in the morning to see what the issue was and they told us that they would investigate the issue and return our call as soon as they figured out what was causing it, or when they got it corrected. Morning turned to afternoon, and finally we heard back from them with a surprising answer. Turns out that the Litigant Strategic Profiles couldn’t understand February 29th, and therefore the reports simply wouldn’t run. The solution was to not run the reports until March 1st, when the system would be back to normal.”

The author rightly points out that his $2 alarm clock recognizes Leap Day, but a very expensive subscription database cannot. Needless to say, anyone needing Litigant Strategic Profiles on February 29, 2012, would not be satisfied to wait until the next day to continue their projects. The news is a poor reflection on LexisNexis. While the company later denied the Leap Day connection, and maintains it was a non-related “systems issue,” this is a good reminder of how dependent we are as professionals upon information storage and retrieval systems.

Glitches are a reality, bugs a way of life, but when our systems shut down, we shut down. This is all the more reason to invest in trusted, vetted information solutions and have contingency and redundancy plans for when issues arise. Even then, problems will occur, but stay calm and trust those old-fashioned solutions: patience and common sense.

Emily Rae Aldridge, March 2, 2012

Sponsored by Pandia.com

The Lady Librarian of Toronto

March 1, 2012

Ah, the good old days. Canada’s The Globe and Mail profiles a powerhouse of a librarian who recently passed away at the age of 100 in “When Lady Librarians Always Wore Skirts and You didn’t Dare Make Noise.” When Alice Moulton began her career, libraries were very different than they are today. Writer Judy Stoffman describes:

“When Alice Moulton went to work at the University of Toronto library in 1942, libraries were forbidding, restricted spaces organized around the near-sacred instrument known as the card catalogue. They were ruled by a chief librarian, always male, whose word was law. Staff usually consisted of prim maiden ladies, dressed in skirts and wearing serious glasses, like the character played by Donna Reed in It’s a Wonderful Life, in the alternate life she would have had without Jimmy Stewart.”

The article is worth reading if only as a profile of a strong woman from a bygone era, but it also paints a portrait of libraries in the 20th Century. Among other things, Stoffman reveals that, in the ‘40s and ‘50s, libraries had a locked room called the “inferno” where the banned books were kept. In the spirit of free access to information, such volumes had been released from captivity by the time Moulton retired.

With the modern-day censorship issues that have emerged online, we would not be surprised if brick-and-mortar libraries experienced a resurgence. They may be back if censorship kicks into high gear and we return to the printed word.

Cynthia Murrell, March 1, 2012

Sponsored by Pandia.com

Exogenous Complexity 3: Being Clever

February 24, 2012

I just submitted my March 2012 column to Enterprise Technology Management, published in London by IMI Publishing. In that column I explored the impact of Google’s privacy stance on the firm’s enterprise software business. I am not letting any tiny cat out of a big bag when I suggested that the blow back might be a thorn in Googzilla’s extra large foot.

In this essay, I want to consider exogenous complexity in the context of the consumerization of information technology and, by extension, on information access in an organization. The spark for my thinking was the write up “Google, Safari and Our Final Privacy Wake-Up Call.”

Here’s a clever action. MIT students put a red truck on top of the dome. For more see http://radioboston.wbur.org/2011/04/06/mit-hacks.

If you do not have an iPad or an iPhone or an Android device, you will want to stop reading. Consumerization of information technology boils down to employees and contract workers who show up with mobile devices (yes, including laptops) at work. In the brave new world, the nanny instincts of traditional information technology managers are little more than annoying nags from a corporate mom.

The reality is that when consumer devices enter the workplace, three externalality happen in my experience.

First, security is mostly ineffective. Clever folks then exploit vulnerable systems. I think this is why clever people say that the customer is to blame. So clever exploits cluelessness. Clever is exogenous for the non clever. There are some actions an employer can take; for example, confiscating personal devices before the employee enters the work area. This works in certain law enforcement, intelligence, and a handful of other environments; for example, fabrication facilities in electronics or pharmaceuticals. Mobile devices have cameras and can “do” video. “Secret” processes can become un-secret in a nonce. In the free flowing, disorganized craziness of most organizations, personal devices are ignored or overlooked. In short, in a monitored financial trading environment, a professional can send messages outside the firm and the bank’s security and monitoring systems are happily ignorant. The cost of dropping a truly secure box around a work place is expensive and beyond the core competency of most information technology professionals.

Second, employees blur information which is “for work” with information which is “for friends, lovers, or acquaintances.” The exogenous factor is political. To fix the problem, rules are framed. The more rule applied to a flawed system, the greater the likelihood is that clever people will exploit systems which ignore the rules. Clever actions, therefore, increase. In short, this is a variation of the Facebook phenomena when a posting can reach many people quickly or lie dormant until the data load explodes like long forgotten Fourth of July fire cracker. As people chase the fire, clever folks exploit the fire. Information time bombs are not thought about by most senior managers, but they are on the radar of those involved in a legal matter and in the minds of some disgruntled programmers. The half life of information is less well understood by most professionals than the difference between a uranium based reactor and a thorium based reactor. Work and life information are blended, and in my opinion, the compound is a dangerous one.

Third, vendors focusing on consumerizing information technology spur adoption of devices and practices which cannot be easily controlled. The data-Hoovering processes, therefore, can suck up information which is proprietary, of high value, and potentially damaging to the information owner. Information is not “like sand grains.” Some information is valueless; other information commands a high price. In fact, modern content processing and data analytic systems can take fragments of information and “fuse” them. To most people these amalgams are of little interest. But to someone with specialized knowledge, the fused data are not god nuggets, the fused data are a chunky rosy diamond, maybe a Pink Panther. As a result, an exogenous factor increases the flow of high value data through uncontrolled channels.

prank

A happy quack to Gunaxin. You can see how clever, computer situations, and real life blend in this “pranking” poster. I would have described the wrapping of equipment in plastic “clever.” But I am the fume hood guy, Woodruff High School, 1958 to 1962. Image source: http://humor.gunaxin.com/five-funny-prank-fails/48387

Now, let’s think about being clever. When I was in high school, I was one of a group of 25 students who were placed in an “advanced” program. Part of the program included attending universities for additional course work. I ended up at the University of Illinois at age 15. I went back to regular high school, did some other Fancy Dan learning programs, and eventually graduated. My specialty was tricking students in “regular” chemistry into modifying their experiments to produce interesting results. One of these suggestions resulted in a fume hood catching fire. Another dispersed carbon strands through the school’s ventilation system. I thought I was clever, but eventually Mr. Shepherd, the chemistry teach, found out that I was the “clever” one. I sat in the hall for the balance of the semester. I adapted quickly, got an A, and became semi-famous. I was already sitting in the hall for writing essays filled with double entendres. Sigh. Clever has its burdens. Some clever folks just retreat into a private world. The Internet is ideal for providing an environment in which isolated clever people can find a “friend.” Once a couple of clever folks hook up, the result is lots of clever activity. Most of the clever activity is not appreciated by the non clever. There is the social angle and the understanding angle. In order to explain a clever action, one has to be somewhat clever. The non clever have no clue what has been done, why, when, or how. There is a general annoyance factor associated with any clever action. So, clever usually gets masked or shrouded in something along the lines, “Gee, I am sorry” or “Goodness gracious, I did not think you would be annoyed.” Apologies usually work because the non clever believe the person saying “I’m sorry” really means it. Nah. I never meant it. I did not pay for the fume hood or the air filter replacement. Clever, right?

What happens when folks from the type of academic experience I had go to work in big companies. Well, it is sink or swim. I have been fortunate because my “real” work experiences began at Halliburton Nuclear Services and continued at Booz, Allen & Hamilton when it was a solid blue chip firm, not the azure chip outfit it is today. The fact that I was surrounded by nuclear engineers whose idea of socializing was arguing about Monte Carlo code and nuclear fuel degradation at the local exercise club. At Booz, Allen the environment was not as erudite as the nuclear outfit, but there were lots of bright people who were actually able to conduct a normal conversation. Nevertheless, the Type As made life interesting for one another, senior managers, clients, and family. Ooops. At the Booz, Allen I knew, one’s family was one’s colleagues. Most spouses had no idea about the odd ball world of big time consulting. There were exceptions. Some folks married a secretary or colleague. That way the spouse knew what work was like. Others just married the firm, converting “quality time” into two days with the dependents at a posh resort.

So clever usually causes one to seek out other clever people or find a circle of friends who appreciate the heat generated by aluminum powder in an oxygen rich environment. When a company employs clever people, it is possible to generalize:

Clever people do clever things.

What’s this mean in search and information access? You probably already know that clever people often have a healthy sense of self worth. There is also arrogance, a most charming quality among other clever people. The non-clever find the arrogance “thing” less appealing.

Let’s talk about information access.

Let’s assume that a clever person wants to know where a particular group of users navigate via a mobile device or a traditional browser. Clever folks know about persistent cookies, workarounds for default privacy settings, spoofing built in browser functions, or installation of rogue code which resets certain user selected settings on a heartbeat or restart. Now those in my advanced class would get a kick out these types of actions. Clever people appreciate the work of clever people. When the work leaves the “non advanced” in a clueless state, the fun curve does the hockey stick schtick. So clever enthuses those who are clever. The unclever are, by definition, clueless and not impressed. For really nifty clever actions, the unclever get annoyed, maybe mad. I was threatened by one student when the Friday afternoon fume hood event took place. Fortunately my debate coach intervened. Hey, I was winning and a broken nose would have imperiled my chances at the tournament on Saturday.

Now more exogenous complexity. Those who are clever often ignore unintended consequences. I could have been expelled, but I figured my getting into big trouble would have created problems with far reaching implications. I won a State Championship in the year of the fume hood. I won some silly scholarship. I published a story in the St Louis Post Dispatch called “Burger Boat Drive In.” I had a poem in a national anthology. So, I concluded that a little sport in regular chemistry class would not have any significant impact. I was correct.

However, when clever people do clever things in a larger arena, then the assumptions have to be recalibrated. Clever people may not look beyond their cube or outside their computer’s display. That’s when the exogenous complexity thing kicks in.

So Google’s clever folks allegedly did some work arounds. But the work around allowed Microsoft to launch an attack on Google. Then the media picked up on the work around and the Microsoft push back. The event allowed me to raise the question, “So workers bring their own consumerized device to work. What’s being tracked? Do you know? Answer: Nope.” What’s Google do? Apologize. Hey, this worked for me with the fume hood event, but on a global stage when organizations are pretty much lost in space when it comes to control of information, effective security, and managing crazed 20 somethings—wow.

In short, the datasphere encourages and rewards exogenous behavior by clever people. Those who are unclever take actions which sets off a flood of actions which benefit the clever.

Clever. Good sometimes. Other times. Not so good. But it is better to be clever than unclever. Exogenous factors reward the clever and brutalize the unclever.

Stephen E Arnold, February 24, 2012

Sponsored by Pandia.com

DuckDuckGo Excitement: Real or Semi Real?

February 19, 2012

I like DuckDuckGo. I like Blekko. I like Yandex. I don’t get too excited about Bing because the number of useful pages indexed in a meaningful way is an issue for me. I don’t jump up and down for Exalead’s free Web search because the span of results seems narrow and stale for some of my queries.I don’t like Google as much as I did in 2006 because relevance seems to be—ah, how shall I phrase it—situational.

So it is not surprising that DuckDuckGo is showing a rise in usage. You can get the metrics which are causing some azure chip consultants to crank up their sales efforts for a special Web search usage report. You can see some of the DuckDuckGo data in “DuckDuckGo Searches Going Waaaaay Up.” The data show DuckDuckGo enjoying an increase in usage. Assume the data in the write up are accurate. DuckDuckGo has doubled its direct queries, nosing close to one million queries. Here is the key passage:

For the first time ever since the search engine opened its doors, it received more than 1 million direct search queries. These are generated by direct user requests. Api requests sit steady at the ten million per day mark.

Last I heard, Google was in the three billion queries per day territory. Big difference. Real growth but I think more “semi real” when compared to Google’s traffic. Worth monitoring the trend, however.

Stephen E Arnold, February 19, 2012

Sponsored by Pandia.com

Online and Medicine: Responsibility Falls on Customer

February 19, 2012

Sunday morning in Harrod’s Creek. Reasonably quiet for now. Gun fire will crackle when the sun rises. Police sirens will howl as some Commonwealth residents crash their cars after a late night run on the Bourbon Trail.

These are consequences of human choices. Guns do not fire themselves. Automobiles, at least so far, do not drive themselves.

Two stories caught my attention, and the way in which an “issue” was handled by writers and their publications make clear the odd handling of human intent.

First, navigate to “Infants’ Tylenol Recalled.” The hook is that a large company, Johnson & Johnson, manufactured or caused to be manufactured a medicine which can do harm not good. I do not know if the story is accurate, but it contains an interesting passage:

Company officials say in some cases the flow restrictor was pushed into the bottle when inserting the syringe. The recall applies to one-ounce bottles of grape flavored Infants Tylenol Oral Suspension. There have been no adverse events from the problem according to McNeil.

So no adverse effect to a child given Tylenol. Okay, the company is not chastised, nor is the article placing blame. On the surface, it seems that the company facing the allegation took action were it not for this statement: “Recall-plagued Johnson & Johnson is pulling all infant Tylenol off the U.S. Market.” So somewhere in this recall story people made decisions and people did the alleged action to put infants at risk.

Now point your browser thing at “Google’s Privacy Invasion: It’s Your Fault.” The story addresses the allegation that either Apple or Google took competitive actions. The online customer, in my opinion, is a clueless about the risk of certain online actions as is an infant taking medicine. Note what the “real” journalists at InfoWorld offer:

No, let’s put the blame where it belongs, on us, the users of the Internet. We rely on free services like Gmail while insisting on “privacy,” a term that we probably can’t even define to our collective satisfaction. We accept terms of service contracts and privacy policies that explain in excessive detail how we will not get privacy, how our information will be used, and then we object.
So instead of privacy, let’s talk about control. You do have some of that, still. Make some choices about how your information will be used–because it will be used–instead of accepting default settings.

Okay, online customers are at fault. Why are both stories giving the entities facing these allegations such gentle treatment. Humans make decisions at companies which have an impact on consumers who assume, trust, or expect products to work without a problem.

I find this interesting because as products and services become more complex, those using the problems are making decisions which deliver customer satisfaction. Maybe customer satisfaction is not a priority? Maybe journalists are finding it easier to ignore or shift the blame?

Fascinating. When one tries to search for information about these matters, the content which surfaces is not about the deeper problems. When content is removed or shaped, the “facts” of an issue become secondary to the spin. “Consumers, it is your fault” becomes the reality. I don’t believe this assertion for one New York minute. And pharma companies? Yikes.

Stephen E Arnold, February 19, 2012

Sponsored by Pandia.com

Faking Out the Panda: Crazy Notions

February 19, 2012

More baloney from the desperate world of tricking Google. Search Engine Journal offers an “Easy Way to Understand Google’s Panda.” Writer Melissa Fach reproduces here an infographic with this introduction:

There are so many myths out there about Panda and what it means. This infographic from Single Grain makes it very easy for you to understand what Panda is, what can hurt your site, link building tips and offers suggestions on what to do if your website was affected.

This graphic actually seems to do what it claims, and the pandas in it are quite cute. However, we maintain that trying to outsmart the Panda is a waste of time and energy, and adds no value to the Web community. Better to focus on providing original, quality content that actually brings value to your site’s visitors.

Nothing tricky about that. Why not just write interesting and useful articles? We just do our thing at Beyond Search. Geese, not pandas too.

Cynthia Murrell, February 19, 2012

Sponsored by Pandia.com

Rapidhog Has the Answers

February 15, 2012

We’ve found another information aggregation service that taps into the “collective wisdom” of the Web. Rapidhog is a place where folks can buy and sell knowledge. Its About page states:

Rapidhog connects the people who need to know and the people who do know to create a community of information exchange. The site allows people to freely ask questions and obtain answers while allowing those who answer to earn money for their help. It will also allow those who have information they find helpful such as video tutorials and walkthroughs to offer those to our members at a cost.

My question is about quality control. How do I know the person to whom I’m giving a few bucks to answer my question isn’t just making something up? Or, more likely, performing the Web search I could have done for free and probably in less time than it took to post my query?

With the Associated Press focusing on certain aggregation services, those offering new types of roll up services may want to check their rear view mirror.

Cynthia Murrell, February 15, 2012

Sponsored by Pandia.com

A Fairy Tale: AOL Was Facebook a Long Time Ago

February 8, 2012

The Wall Street Journal amuses me. A Murdoch property, the newspaper does its best to minimize the best of “real” News Corp. journalism. I appreciate objective editorials which present oracular explanations of meaningful events in the world of “real” business.

losers blue copy

A good read is “How AOL—Aka Facebook 1.0—Blew Its Lead” by Jesse Kornbluth. What is interesting is that this is a report from a person with Guccis on the ground. According to my hard copy edition, February 8, 2012, page A15:

Mr. Kornbluth was editorial director of America Online from 1997 to 2003. He now edits Headbutler.com.

I did a quick search on Facebook 3.0—aka Google—and learned from no less an authority than the Huffington Post the Mr. Kornbluth edits a blog which is a “cultural concierge service.” He is a “real” journalist and has been a contributing editor for Vanity Fair and new York, and a contributor to the New Yorker, the New York Times, etc.”

The addled goose is still in recovery mode, sort of like a very old restore from the now disappeared Fastback program. Thinking of old software and AOL, I think in 1999America Online was in hog heaven in terms of stock price. I recall shares coming in the $40 to $100 range. The accounting issues of 1993 were behind the company. The merger with Time Warner was a done deal by mid January 2000. The $350 billion was a nice round number. The New York Times marked the 10th anniversary in its “analysis” on January 11, 2010, with the story “How the AOL-Time Warner Merger Went So Wrong.”

Now I learn that AOL was Facebook 1.0. I had forgotten about AOL’s chat rooms. When I think of chat rooms, I recall CompuServe, but I was never into AOL despite the outstanding marketing campaign with the jazzy CD ROMs that seemed to be everywhere. Here’s Mr. Kornbluth’s Facebook parallel:

Read more

Google Shift: Lamenting the Inevitable

February 5, 2012

The addled goose is recuperating. In the interstices between biological auto mechanics and the outputs of patient-hungry pharmaceutical companies, I browse content which gets lots of clicks. In the Lady Gaga Era, Mark Zuckerberg may not have her sense of fashion, but the lad does generate headlines. Not surprisingly, with the rise of the $100 billion Facebook and the Apple quarterly reports, one expects some reflection of the changes the Internet has manifested in the last five years. Remember. We are talking Internet time, which may not be dog years, but five years is a hefty chunk of a plugged in, tuned in, and wired up “expert.”

Here’s an example of a commons. Nice, right? A happy quack to Engage for a great visual metaphor.

For the goose, however, it is the same old cycle. I am tempted to trot out that college favorite Georg Wilhelm Friedrich Hegel and his fascinating The Difference Between Fichte’s and Schelling’s Systems of Philosophy. But I shall instead reference “It’s Not Whether Google’s Threatened. It’s Asking Ourselves: What Commons Do We Wish For?” Though somewhat more colloquial than Herr Hegel’s titles, the thought is an interesting one. The core of the idea is that that old Googzilla just ain’t what she used to be. Here’s the passage I noted:

I’m focused on trying to understand what the Internet would look like if we don’t pay attention to our core shared values. And it’s not fair to blame Apple, Facebook, Amazon, or app makers here. In conversations with various industry folks over the past few months, it’s become clear that there are more than business model issues stifling the growth of the open web.

The author has hooked this statement to what are described as “core values.” Hmm. The idea is that there is a greater good involved if the Internet (an undefined concept because I presume everyone knows what the word means) should embody “no gatekeepers,” “an ethos of the commons,” “no preset rules about how data is [sic] used,” and “interoperability.”

These are interesting points but the fact is that as I write this in my addled state on a dreary Sunday morning in the intellectually bankrupt Commonwealth of Kentucky, I wish to point out:

  1. Core values are tough to slap on the folks whom I know. I imaging venturing into a more intellectually enlightened place, getting folks to agree on care values might be tough. I am thinking about rounding up some bright lights in Syria, for example.
  2. There are gatekeepers, lots of them. The gatekeepers include various governmental entities, outfits like Jike.com, Google and Twitter, and more coming on the bandwagon for “control” every day or so.
  3. The “commons” is another fascinating concept. My recollection is that the chestnut from English history is that the commons were trashed. A more up-to-date interpretation appears in the quirky Science Creative Quarterly’s “Tragedy of the Commons Explained with Smurfs.” If smurfs struggle, imaging what folks in Harrod’s Creek will do. By the way, the chief visual characteristic of this part of Kentucky is fences. Forget Robert Frost. Fences are a big deal for financial, social, and technological reasons.
  4. I find the notion of “no preset rules” intriguing. The fact is that there are many rules about how data are to be used. The fact that people do not follow the rules makes clear that the notion of sharing certain values does not fit in 2012. Most people have zero concept of the data which are available from commercial outfits and even less understanding of what makes systems like i2 and Recorded Future work so well. In today’s world, rules are put in place so that when there is a “justifiable cause”, action can be taken. Preset rules are the main business of those running governmental entities.

The “old” Internet has become a memory. My mother, God rest her soul, would use the past as a way to make the present come up short. I remember her telling me that when she was in school in the 1930s, students and teachers were somehow better than the teachers I had in 1950. I understand the importance of remembering the past. Opening an long unused box containing knickknacks my mother treasured can release molecules which take me back to the time when she was reminding me to pick up my socks.

The reality, however, is that as much emotion as memories convey, the real world is different and changing. Pining for the “old” Internet is an indulgence which is mentally satisfying on some level. Adopting a parental tone is part of today’s “mindset.” See, for example, Cognition in the Wild by Edwin Hutchins.

What’s this have to do with search? Here you go, gentle reader:

  1. Free, public search systems and some commercial online systems do not return objective, accurate information.
  2. Walled gardens are a consequence of the economic environment in which organizations exist. The fuzzy, warm notions of “freemium” seem quaint in the world of the 99 percenters.
  3. The evolution of online is toward consolidation and what I call a “logical monopoly.” The reason has to do with users who are reluctant to change once something becomes a habit. The other driving force is economic rationality. Who can afford to create a competitor to any of the monopolies which have formed or are now coalescing in online?

The net net is that some folks may not like today’s online world. Get used to it is my suggestion. The goose prefers pond water unsullied by mine drainage runoff. Guess what? Those pristine ponds are history, just like the good, old Internet.

Stephen E Arnold, February 5, 2012

Sponsored by Pandia.com

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta