21. Contracts of carriage of goods by sea

2019 ◽  
pp. 567-596
Author(s):  
Eric Baskind ◽  
Greg Osborne ◽  
Lee Roach
Keyword(s):  

This chapter discusses situations wherein the shipper will only form a contract to book space on a ship. In such a case, the person requiring the goods to be carried, called the ‘shipper’, enters into a contract of carriage of the goods with the person having possession and control of the ship, the ‘carrier’. The carrier need not have title to an absolute interest in the ship; he or she may be a charterer having at most only possessory title, and the shipper may well pass his or her rights in the goods along with his or her rights against the carrier to a third party. Although the terms ‘shipper’ and ‘carrier’ are used here, the parties concerned would often be more accurately described as the ‘cargo interests’ and the ‘ship interests’.

2020 ◽  
Author(s):  
Reham AlTamime ◽  
Vincent Marmion ◽  
Wendy Hall

BACKGROUND Mobile apps and IoT-enabled smartphones technologies facilitate collecting, sharing, and inferring from a vast amount of data about individuals’ location, health conditions, mobility status, and other factors. The use of such technology highlights the importance of understanding individuals’ privacy concerns to design applications that integrate their privacy expectations and requirements. OBJECTIVE This paper explores, assesses, and predicts individuals’ privacy concerns in relation to collecting and disclosing data on mobile health apps. METHODS We designed a questionnaire to identify participants’ privacy concerns pertaining to a set of 432 mobile apps’ data collection and sharing scenarios. Participants were presented with 27 scenarios that varied across three categorical factors: (1) type of data collected (e.g. health, demographic, behavioral, and location); (2) data sharing (e.g., whether it is shared, and for what purpose); and, (3) retention rate (e.g., forever, until the purpose is satisfied, unspecified, week, or year). RESULTS Our findings show that type of data, data sharing, and retention rate are all factors that affect individuals’ privacy concerns. However, specific factors such as collecting and disclosing health data to a third-party tracker play a larger role than other factors in triggering privacy concerns. CONCLUSIONS Our findings suggest that it is possible to predict privacy concerns based on these three factors. We propose design approaches that can improve users’ awareness and control of their data on mobile applications


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2016 ◽  
Author(s):  
Brian A. Nosek ◽  
Mahzarin R. Banaji ◽  
Anthony G. Greenwald

Differences between traditional laboratory research and Internet-based research require review of basic issues of research methodology. These differences have implications for research ethics (e.g., absence of researcher, potential exposure of confidential data and/or identity to a third-party, guaranteed debriefing) and security (e.g., confidentiality and anonymity, security of data transmission, security of data storage, and tracking subjects over time). We also review basic design issues a researcher should consider before implementing an Internet study, including the problem of subject self-selection and loss of experimental control on the Internet laboratory. An additional challenge for Internet-based research is the increased opportunity for subject misbehavior, intentional or otherwise. We discuss methods to detect and minimize these threats to the validity of Internet-based research.


2011 ◽  
Vol 12 (1-2) ◽  
pp. 127-156 ◽  
Author(s):  
JOACHIM SCHIMPF ◽  
KISH SHEN

AbstractECLiPSe is a Prolog-based programming system, aimed at the development and deployment of constraint programming applications. It is also used for teaching most aspects of combinatorial problem solving, for example, problem modelling, constraint programming, mathematical programming and search techniques. It uses an extended Prolog as its high-level modelling and control language, complemented by several constraint solver libraries, interfaces to third-party solvers, an integrated development environment and interfaces for embedding into host environments. This paper discusses language extensions, implementation aspects, components, and tools that we consider relevant on the way from Logic Programming to Constraint Logic Programming.


Web Services ◽  
2019 ◽  
pp. 882-903
Author(s):  
Izabella V. Lokshina ◽  
Barbara J. Durkin ◽  
Cees J.M. Lanting

The Internet of Things (IoT) provides the tools for the development of a major, global data-driven ecosystem. When accessible to people and businesses, this information can make every area of life, including business, more data-driven. In this ecosystem, with its emphasis on Big Data, there has been a focus on building business models for the provision of services, the so-called Internet of Services (IoS). These models assume the existence and development of the necessary IoT measurement and control instruments, communications infrastructure, and easy access to the data collected and information generated by any party. Different business models may support opportunities that generate revenue and value for various types of customers. This paper contributes to the literature by considering business models and opportunities for third-party data analysis services and discusses access to information generated by third parties in relation to Big Data techniques and potential business opportunities.


Author(s):  
Izabella V. Lokshina ◽  
Cees J. M. Lanting ◽  
Barbara Durkin

This chapter focuses on ubiquitous sensing devices, enabled by Wireless Sensor Network (WSN) technologies, that cut across every area of modern day living, affecting individuals and businesses and offering the ability to measure and understand environmental indicators. The proliferation of these devices in a communicating-actuating network creates the internet of things (IoT). The IoT provides the tools to establish a major global data-driven ecosystem with its emphasis on Big Data. Currently, business models may focus on the provision of services, i.e., the internet of services (IoS). These models assume the presence and development of the necessary IoT measurement and control instruments, communications infrastructure, and easy access to the data collected and information generated. Different business models may support creating revenue and value for different types of customers. This chapter contributes to the literature by considering, innovatively, knowledge-based management practices, strategic opportunities and resulting business models for third-party data analysis services.


2018 ◽  
Vol 8 (2) ◽  
pp. 66-95 ◽  
Author(s):  
Adil Maarouf ◽  
Youssef Mifrah ◽  
Abderrahim Marzouk ◽  
Abdelkrim Haqiq

This article describes how currently, service level agreements (SLAs) assurance forms one of the major challenges for cloud computing (CC) in order to guarantee quality of service (QoS) in real-time and control SLA violations. However, due to the highly dynamic nature of this open environment, it is important to have a binding agreement between all the service parties for ensuring trust while fulfilling the expected QoS. To properly operate and manage such complex situations, an effective and efficient monitoring is crucial. The participation of a trusted third party (TTP) is necessary in order to resolve conflicts between involved parties. This article proposes an autonomic SLA monitoring framework managed by TTP composed of two modules: the first one SLA establishment module, which aims at providing support for automated SLA generation and management. The second one, a service monitoring module to dynamically monitor QoS metrics by detecting SLA violations at runtime to verify compliances for the respective SLAs, and to propose a mechanism for an adaptive remedy rectification, as a contribution at the third maturity level of the autonomic computing paradigm as defined by IBM. The framework is validated with scenarios on response time and availability, the results obtained are promising. They confirm that this framework manages SLAs in an efficient way as it detects all violations to be communicated to concerned parties, and identifies particular penalty clauses that can be used to modify the reputation of a provider over time. The TTP framework equipped with such reputation module can provide real-time assessment for consumers informed decision making to continue using a service or to migrate to another service provider in the case of service degradation. This creates a fair competitiveness between providers and hence improves service performance and the reliability in the cloud.


2011 ◽  
Vol 39 (S1) ◽  
pp. 42-45 ◽  
Author(s):  
Donald Warne

Perhaps the most significant law affecting the provision of health services to the American Indian and Alaska Native (AI/AN) population is the Indian Self-Determination and Education Assistance Act of 1975 (ISDEAA, PL 93-638). This Act allows tribes to assume the management and control of health care programs from Indian Health Service (IHS) and to increase flexibility in health care program development. Under ISDEAA, tribes have the option to contract or compact with IHS to deliver health services using pre-existing IHS resources (formula-based shares tables determine funding for various IHS sites), third party reimbursements, grants, and other sources. Typically, tribes develop their own non-profit health care corporations to provide services to their community, and as a result are eligible for grants and other types of funding not available to federal agencies like IHS.


Author(s):  
Aliya Dharaningtyas ◽  
Adirizal Nizar

The delivery system for Base Transceiver System (BTS) to strengthen the telecommunication network throughout Indonesia maritime country is needed to speed up the process due to uneven distribution of sufficient telecommunications infrastructure. PT. Gunadhya Rajawali Logistik (GRL) is a third-party logistics company that focuses on transportation and warehouse management and delivery for telecommunication equipment tools. Unfortunately, in delivering BTS installation part throughout Indonesia, PT. GRL received several warning letters and had to pay a penalty from one of customers, for being late in reporting the delivery proof. This study aims to analyze the root causes of late submission of Soft Copy of Proof of Delivery (SCPOD) to avoid penalty given by the customer and determine suitable solutions to improve the process. The approach used in this study is lean six sigma with the help of Define, Measure, Analyze, Improve, and Control (DMAIC) roadmap. According to the interview with the employees related, the root causes of late submission of SCPOD are irresponsible drivers, indiscipline drivers in carrying out deliveries, and lack of data management in the transportation system. To be able to solve this problem, several proposed solutions can be applied. The proposed solutions to overcome the root causes that should be applied by the company are to hire a document control, retraining the Standard Operating Procedure (SOP) for drivers, utilize transportation management system application, and apply incentive systems for drivers. In the future, it is recommended for PT. GRL to have a minimum standard in recruiting the drivers for example only recruit who possess a minimum of high school education to ease the completion of administrative tasks.  


2021 ◽  
Vol 9 (4) ◽  
pp. 857-866 ◽  
Author(s):  
Quang-Huy Ngo

The literature addresses the link between command and control environmental regulation and environmental performance. However, there is a lack of attention paid to how environmental strategy plays a mediating role in this relationship. In addition, the environmental research in the context of third-party logistics service providers seems to be underexplored. Thus, through the theoretical lens of institutional theory and contingency theory, this study examines the mediating role of environmental strategy on the relationship command and control environmental regulation and environmental performance. Data were collected from small and medium enterprises operating in the logistics industry of Vietnam and partial least square structural equation modeling was employed to examine the proposed hypotheses. The result indicates the full mediating effects of environmental strategy on the link between command and control environmental regulation and environmental performance. In this regard, this study contributes to growing empirical evidence showing that the link between environmental regulation and environmental performance is indirect through mediators. Besides, this study also extends the current knowledge of environmental strategy pursued by third-party logistics providers.


Sign in / Sign up

Export Citation Format

Share Document