scholarly journals Intermodal Logistics Processes Supported by Electronic Freight and Warehouse Exchanges

2013 ◽  
Vol 14 (3) ◽  
pp. 206-213 ◽  
Author(s):  
Gábor Bohács ◽  
Ivett Frikker ◽  
Gabor Kovács

Nowadays, modern companies operate in a common logistics network. In a modern approach, these networks of companies are called virtual enterprises, whose main purpose is the maximal fulfillment of customer needs and process optimization. The electronic freight and warehouse exchange is a good basis for building virtual enterprises, and that may be a new way to support the reorganization of the supply chains, and to rethink the connections within the intermodal network. Firstly, the paper presents the need of intermodality. On the other hand, it details the benefits and the critical evaluation of intermodality. It presents the general transshipment processes and techniques then evaluates the containers based on their main features. On this basis, the paper describes the electronic freight and warehouse exchange as a member of cloud supply chain. Moreover, the paper contains the new challenges and opportunities of electronic freight and warehouse exchanges as complex logistics providers.

Author(s):  
Ejub Kajan

Many interoperable frameworks have been suggested, developed, and implemented in the past. Most of them are based on XML, web services, and semantic web technologies. In the meantime, globalization and the further development of internet and web have raised new challenges and opportunities. New form of networked organizations, known as virtual enterprises, seeks for knowledge sharing around common goals. The rise of the social and ubiquitous world, where everything is going to be connected, gives a lot of technical opportunities for electronic business, but at the same time makes new barriers due to increasing heterogeneity issues. This chapter gives an overview of main challenges, obstacles, approaches, recent research efforts, and forecasts in order to overcome recent interoperability problems.


2021 ◽  
Vol 13 (9) ◽  
pp. 4900
Author(s):  
Marzanna Jagiełło

This year, 40 years have passed since the adoption of the basic document for the protection of historic gardens, i.e., the Florence Charter. During this time, its recommendations have been verified by both conservation and researchers’ actions, who in various environments discussed its meaning as well as its essential shortcomings. Some of the provisions of the Charter were criticized in the context of the effects of their use, especially those relating to the issue of historic gardens fundamental protection, namely to authenticity in its various scopes with particular emphasis on the use of source research which raises many reservations for conservation actions. Moreover, their excessively superficial interpretation, which was demonstrated by the example of the most popular plant used in regular gardens, namely boxwood. This article presents and analyzes the most important theses of these discussions and the main axes of the dispute, dividing them into two parts, i.e., the first relating to authenticity and the other to the use of sources. On this basis, it was necessary to extend these considerations to all kinds of historic greenery. Attention was also paid to the meaning and scope of authenticity which changed along with the expansion of the semantic field in relation to heritage. Furthermore, the fact that since the adoption of the Florence Charter, some of the aspects of authenticity indicated in the article have been included in other documents developed under the auspices of ICOMOS, but usually relating to the heritage as a whole, sometimes considered regionally. Appendices contain the most important doctrinal documents referring separately to authenticity, meaning, as well as types and the scope of the usage of sources. This article presents new contexts in which authenticity connected with climate change and the postulates of the development doctrine should be considered. Additionally, the article indicates the need to extend the conditions in which to start considering the historical greenery areas, which should be treated as an element of green infrastructure. The article also points to the use of new techniques and tools in research on authenticity. The summary indicated the necessity to continue the discussion on aspects of authenticity in relation to historic greenery layouts. Taking into account all the above aspects and at the same time meeting the ICOMOS “Journeys for Authenticity” initiative, As part of the conclusions from the analyzes carried out in the article, a model of procedure was proposed. It aims to bring us closer to the preparation of a new document recommending the protection of historic greenery, addressing both critical comments about the present Florence Charta, as well as new challenges and opportunities. This model is shown by means of a diagram. Part of it is a set of themes around which around which the debate on the new Florence Charter could be launched. They were assigned to four panels, i.e., I. Historic greenery as an element of heritage: II. Authenticity of historic greenery complexes in research and conservation strategies; III. Authenticity of historic greenery complexes and sustainable development; IV. New techniques and tools in research on the authenticity of historic greenery layouts.


Author(s):  
Ejub Kajan

Many interoperable frameworks have been suggested, developed and implemented in the past. Most of them are based on XML, Web services and Semantic Web technologies. In the meantime, globalization, and the further development of Internet and Web have raised new challenges and opportunities. New form of networked organizations, known as virtual enterprises, seeks for knowledge sharing around common goals. The raise of social and ubiquitous world, where everything is going to be connected gives a lot of technical opportunities for electronic business, but at same time makes new barriers due to increasing heterogeneity issues. This article gives an overview of main challenges, obstacles, approaches, recent research efforts, and forecasts in order to overcome recent interoperability problems.


2021 ◽  
pp. 135050682110207
Author(s):  
Rutvica Andrijasevic

This article makes a conceptual contribution to the broader literature on unfree labour by challenging the separate treatment of sexual and industrial labour exploitation both by researchers and in law and policy. This article argues that the prevailing focus of the supply chain literature on industrial labour has inadvertently posited sexual labour as the ‘other’ of industrial labour thus obfuscating how the legal blurring of boundaries between industrial and service labour is engendering new modalities of the erosion of workers’ rights that are increasingly resembling those typical of sex work. This article advances the debate on unfree labour both conceptually and empirically. Conceptually, it highlights the relevance of social reproduction in understanding forms of labour unfreedom. Empirically, it demonstrates the similarities in forms of control and exploitation between sex work and industrial work by illustrating how debt and housing operate in both settings.


2021 ◽  
Vol 11 (9) ◽  
pp. 4105
Author(s):  
Luis Daniel Samper-Escalante ◽  
Octavio Loyola-González ◽  
Raúl Monroy ◽  
Miguel Angel Medina-Pérez

The reach and influence of social networks over modern society and its functioning have created new challenges and opportunities to prevent the misuse or tampering of such powerful tools of social interaction. Twitter, a social networking service that specializes in online news and information exchange involving billions of users world-wide, has been infested by bots for several years. In this paper, we analyze both public and private databases from the literature of bot detection on Twitter. We summarize their advantages, disadvantages, and differences, recommending which is more suitable to work with depending on the necessities of the researcher. From this analysis, we present five distinct behaviors in automated accounts exhibited across all the bot datasets analyzed from these databases. We measure their level of presence in each dataset using a radar chart for visual comparison. Finally, we identify four challenges that researchers of bot detection on Twitter have to face when using these databases from the literature.


2021 ◽  
Vol 11 (12) ◽  
pp. 5585
Author(s):  
Sana Al-Farsi ◽  
Muhammad Mazhar Rathore ◽  
Spiros Bakiras

Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. Although, the primary motive of using a blockchain for supply chain management is to reduce the overall production cost while providing the comprehensive security to the system. However, current blockchain-based supply-chain management (BC-SCM) systems still hold the possibility of cyber attacks. Therefore, the goal of this study is to investigate practical threats and vulnerabilities in the design of BC-SCM systems. As a starting point, we first establish key requirements for the reliability and security of supply chain management systems, i.e., transparency, privacy and traceability, and then discern a threat model that includes two distinctive but practical threats including computational (i.e., the ones that threaten the functionality of the application) and communication (i.e., the ones that threaten information exchange among interconnected services of the application). For investigation, we follow a unique approach based on the hypothesis that reliability is pre-requisite of security and identify the threats considering (i) design of smart contracts and associated supply chain management applications, (ii) underlying blockchain execution environment and (iii) trust between all interconnected supply management services. Moreover, we consider both academic and industry solutions to identify the threats. We identify several challenges that hinder to establish reliability and security of the BC-SCM systems. Importantly, we also highlight research gaps that can help to establish desired security of the BC-SCM. To the best of our knowledge, this paper is the first effort that identifies practical threats to blockchain-based supply chain management systems and provides their counter measures. Finally, this work establishes foundation for future investigation towards practical security of BC-SCM system.


Laws ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 46
Author(s):  
Esther Salmerón-Manzano

New technologies and so-called communication and information technologies are transforming our society, the way in which we relate to each other, and the way we understand the world. By a wider extension, they are also influencing the world of law. That is why technologies will have a huge impact on society in the coming years and will bring new challenges and legal challenges to the legal sector worldwide. On the other hand, the new communications era also brings many new legal issues such as those derived from e-commerce and payment services, intellectual property, or the problems derived from the use of new technologies by young people. This will undoubtedly affect the development, evolution, and understanding of law. This Special Issue has become this window into the new challenges of law in relation to new technologies.


Sign in / Sign up

Export Citation Format

Share Document