the third party
Recently Published Documents


TOTAL DOCUMENTS

777
(FIVE YEARS 210)

H-INDEX

17
(FIVE YEARS 3)

2022 ◽  
Vol 10 (1) ◽  
pp. 168-181
Author(s):  
Ericbert Tambou Kamgue

Levinasian philosophy is characterized as a philosophy of ethical subjectivity and asymmetrical responsibility. Ethics is understood as the subject that gives itself entirely to the Other. However, the Other is never alone. His face attests to the presence of a third party who, looking at me in his eyes, cries for justice. There is no longer any question for the subject to devote himself entirely to the Other (ethical justice), to give everything to him at the risk of appearing empty-handed before the third party. How then to serve both the Other and the third party? The question of the political appears in the thought of Levinas with the emergence of the third party who, like the Other, challenges me and commands me (social justice). The third party establishes a political space. Politics is in the final analysis the place of the universalization of the ethical requirement born from face-to-face with the face of the Other.


2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Wenbin Wang ◽  
Jia Lv ◽  
Ni An ◽  
Jie Guan ◽  
Shiyuan Quan

This paper investigates the reward-penalty mechanism (RPM) implemented by the government in a closed-loop supply chain (CLSC) with asymmetric information. The manufacturer produces and sells products to consumers, while the collection of waste electrical and electronic equipment (WEEE) is delegated to the third-party collector, the one who has private information about the collection effort level. An information screening contract for the manufacturer is put forward to obtain the private information from the third-party collector, which is composed of buy-back price and franchise fee. By utilizing principal-agent theory, two cases are mainly examined including the CLSC without the RPM and the CLSC with the RPM. The results demonstrate that (i) the information screening contract is effective in capturing the collector’s collection effort level, (ii) raising the buy-back price to motivate the third-party collector is confirmed to perform well on enhancing the collection quantity from consumers, (iii) H-type collector collects more WEEEs and earns more profits than L-type collector, and (iv) the RPM improves the collection quantity of the enterprise and reaps more environmental benefits. The numerical results verify the validity of the contract and the feasibility of the RPM.


Author(s):  
David Lie ◽  
Lisa M. Austin ◽  
Peter Yi Ping Sun ◽  
Wenjun Qiu

We have a data transparency problem. Currently, one of the main mechanisms we have to understand data flows is through the self-reporting that organizations provide through privacy policies. These suffer from many well-known problems, problems that are becoming more acute with the increasing complexity of the data ecosystem and the role of third parties – the affiliates, partners, processors, ad agencies, analytic services, and data brokers involved in the contemporary data practices of organizations. In this article, we argue that automating privacy policy analysis can improve the usability of privacy policies as a transparency mechanism. Our argument has five parts. First, we claim that we need to shift from thinking about privacy policies as a transparency mechanism that enhances consumer choice and see them as a transparency mechanism that enhances meaningful accountability. Second, we discuss a research tool that we prototyped, called AppTrans (for Application Transparency), which can detect inconsistencies between the declarations in a privacy policy and the actions the mobile application can potentially take if it is used. We used AppTrans to test seven hundred applications and found that 59.5 per cent were collecting data in ways that were not declared in their policies. The vast majority of the discrepancies were due to third party data collection such as adversiting and analytics. Third, we outline the follow-on research we did to extend AppTrans to analyse the information sharing of mobile applications with third parties, with mixed results. Fourth, we situate our findings in relation to the third party issues that came to light in the recent Cambridge Analytica scandal and the calls from regulators for enhanced technical safeguards in managing these third party relationships. Fifth, we discuss some of the limitations of privacy policy automation as a strategy for enhanced data transparency and the policy implications of these limitations.


2021 ◽  
Vol 4 ◽  
pp. 1-7
Author(s):  
Peter Schmitz ◽  
Kelcey Inglis ◽  
Patrick Holloway

Abstract. This paper discusses the application of forensic cartography in a civil arbitration case. This arbitration case stemmed from a hijacking of a freight of cigarettes on the 9th of May 2012. Forensic cartography in the form of a report was used to illustrate that the driver of a third-party logistics company was complicit with the crime syndicate that committed the hijacking. Cell phone data was used to map the communication between the various suspects and the driver. The time period of interest was between 15 December 2011 and 9 May 2012. The cellular base stations were used to map these communications in time and space. Based on the evidence provided it was clear that the driver of the third-party logistics company was complicit in committing the crime which led to the arbitration proceedings to be settled by the third-party logistics company in favour of the cigarette manufacturer. Further, it was concluded that the cartographic representation selection for forensic purposes is dictated by the specific case being investigated.


Author(s):  
Anu Sween Thomas

One of the major concerns of this electronic world is the need to develop innovations in the field of health care cybersecurity. Data reveals that the first ransom attack was reported to be in the year 1989, which was quickly mitigated because of its simplicity1. But 2020 ransomware attacks appear to be more complicated with the sophisticated tool that helps the third-party or cyber attackers to hide from undetected breach detectors. Here arises the need to be aware on the topic and measures to prevent it. This article shall provide a brief knowledge regarding cybersecurity in health care system, threats and pointout some measures to prevent it.


2021 ◽  
Vol 2022 (1) ◽  
pp. 227-252
Author(s):  
Darion Cassel ◽  
Su-Chin Lin ◽  
Alessio Buraggina ◽  
William Wang ◽  
Andrew Zhang ◽  
...  

Abstract Over half of all visits to websites now take place in a mobile browser, yet the majority of web privacy studies take the vantage point of desktop browsers, use emulated mobile browsers, or focus on just a single mobile browser instead. In this paper, we present a comprehensive web-tracking measurement study on mobile browsers and privacy-focused mobile browsers. Our study leverages a new web measurement infrastructure, OmniCrawl, which we develop to drive browsers on desktop computers and smartphones located on two continents. We capture web tracking measurements using 42 different non-emulated browsers simultaneously. We find that the third-party advertising and tracking ecosystem of mobile browsers is more similar to that of desktop browsers than previous findings suggested. We study privacy-focused browsers and find their protections differ significantly and in general are less for lower-ranked sites. Our findings also show that common methodological choices made by web measurement studies, such as the use of emulated mobile browsers and Selenium, can lead to website behavior that deviates from what actual users experience.


2021 ◽  
Vol 43 (2) ◽  
pp. 139-175
Author(s):  
Roosmaryn Pilgram ◽  
Lotte van Poppel

Abstract Regelmatig nemen patiënten een begeleider mee naar medische consulten. Het verloop van shared decision making (SDM) in consulten met drie partijen heeft tot nu toe echter weinig aandacht gekregen. In deze studie wordt nagegaan welke invloed de derde partij kan hebben op het beslisproces. Daartoe specificeren we de rollen die deze partij op zich kan nemen en bespreken we, vanuit een pragma-dialectisch perspectief, hoe deze rollen zich vertalen naar rollen binnen een discussie. Tot slot zetten we op basis van voorbeelden uiteen hoe deze rollen tot uiting kunnen komen in het besluitvormingsproces. In een consult met drie partijen blijken vanuit argumentatief oogpunt twaalf complexe discussiesituaties te kunnen ontstaan, afhankelijk van de aard van het geschil, eventuele coalitievorming en de rollen die de partijen op zich nemen. In een aantal discussiesituaties kan de derde partij een actieve rol spelen en zodoende deelnemen aan het besluitvormingsproces. Alle drie partijen kunnen daarnaast anderen bij de discussie betrekken (bijvoorbeeld door hun mening te vragen) of een coalitie suggereren (bijvoorbeeld door in de wij-vorm te spreken). Indien een derde partij een coalitie suggereert, kan dit enerzijds SDM ten goede komen, doordat de begeleider de patiënt in het besluitvormingsproces steunt. Anderzijds kan dit ook het besluitvormingsproces bemoeilijken wanneer de derde partij (bewust of onbewust) ten onrechte namens de patiënt spreekt. Op eenzelfde wijze kan een derde partij meer of minder constructieve bijdragen leveren aan de besluitvorming door standpunten of argumenten te baseren op de eigen (vermeende) expertise. Abstract The third party in shared decision making. The role of extra participants in discussions between health professionals and patients Patients often bring along a companion to medical consultations, which ideally involve shared decision making (SDM). The way in which SDM proceeds in consultations with three parties has, nonetheless, so far received little attention. In this study, we analyse how the presence of a third party can affect the decision making process. To do so, we specify the roles that this party can fulfil, and discuss, using the pragma-dialectical framework, how these roles relate to discussion roles. Lastly, based on a qualitative analysis of a number of examples we illustrate how the roles that a third party could fulfil can be expressed in actual medical decision making. From an argumentative perspective, twelve complex discussion situations could arise from the presence of three parties, depending on the nature of the disagreement, possible coalition building, and the roles that the parties fulfil. In a number of discussion situations, the third party can play an active role and thus take part in the decision making process itself. All three parties could additionally invite others to participate in the discussion (for instance, by asking for their opinion) or suggest that a coalition has been formed (for instance, by using inclusive ‘we’). A third party suggesting that a coalition exists can further SDM, as the companion could thereby support the patient in the decision making process. However, this could also hinder the decision making process if the third party (consciously or unconsciously) unjustifiably speaks on behalf of the patient. In a similar vein, a third party could contribute in a more constructive or less constructive manner to the decision making process by basing standpoints or arguments on their own (supposed) expertise.


2021 ◽  
Vol 4 (2) ◽  
pp. 119-130
Author(s):  
Előd Bartis

The author of the following study presents the institution of unauthorized agency in Romanian civil law. The conditions and possible cases unauthorized agency are presented, as well as the facts which, although similar, cannot be considered as unauthorized agency. The author analyzes the legal nature of the contract concluded by the unauthorized agent, the legal consequences of the ratification by the principal and discusses in detail the unauthorized agent’s liability to both the principal and the third party. Finally, the study examines the conditions and consequences of the apparent authority, with special regard to the protection of the interests of the parties involved.


2021 ◽  
Vol 56 (5) ◽  
pp. 415-423
Author(s):  
Suwardi ◽  
Achmad Choerudin

This study aims to optimize the utilization of the Local Government's asset in supporting Local Original Income (PAD) in Salatiga City, involving: (1) Asset lease to a third party not based on leasing tariff because Salatiga City Government has not had Local Regulation yet about redistribution of local wealth; (2) The direct use of income resulting from the asset leasing to the third party in which the leasing income is used directly for repairing the damaged object. It is because of an agreement loosely governing right and obligation; and (3) Inadequate supervision over object/asset that the third party can utilize. This research uses a survey method conducted in Salatiga, Central Java, Indonesia, which involves relevant regional apparatus organizations, resource persons, and community leaders. The local asset has strategic value. The quality of asset management should be improved along with the attempt to optimize local income. The effectiveness and efficiency of institutional management can be seen, among others, from the comparison between asset size and income. Asset management of Salatiga City Government is conducted, not merely referring to legislation. However, it should also pay attention to usefulness value to improve local original income and usefulness to the people. This research found that asset optimization is inhibited by the function sustainability of internal management and legislative technique.


Sign in / Sign up

Export Citation Format

Share Document