• Home
  • Seyed Hossein Khasteh
  • OpenAccess
    • List of Articles Seyed Hossein Khasteh

      • Open Access Article

        1 - Secure Computing on the Internet of Everything
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, More
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, including systems, smart devices, industrial systems, and many others. With the immense number of connected objects, information security, and privacy have become significant challenges in IoT computing. This article explores the concept of secure computing in the Internet of Everything. It investigates the impact of the Internet of Things on the concept of security and its related needs. Furthermore, the methods and technologies used to establish secure computing in the Internet of Everything are discussed, including topics such as data encryption, identification and authentication, access management, privacy protection, and threat detection. Additionally, the challenges and drawbacks of secure computing in the Internet of Everything are examined, addressing issues such as the complexity of the connected environment, dynamic security threats, the need for standards and security-related concerns, and the influence of technological changes on secure computing. Finally, solutions and recommendations are provided to enhance secure computing in the Internet of Everything, including the use of strong encryption, centralized access management, user education and awareness, and advanced threat detection and monitoring systems. This article aims to provide a better understanding of secure computing in the Internet of Everything and to develop suitable security solutions for this domain. Manuscript profile
      • Open Access Article

        2 - The extent of the effects of Covid-19 on the global patterns of digital transformation
        seyed omid azarkasb Seyed Hossein Khasteh
        Although the corona crisis is a health phenomenon and a disease, over time it has become a super phenomenon that has involved other parts of society. In the current situation, all countries are dealing with this crisis in different ways and trying to control this crisis More
        Although the corona crisis is a health phenomenon and a disease, over time it has become a super phenomenon that has involved other parts of society. In the current situation, all countries are dealing with this crisis in different ways and trying to control this crisis with less damage. As a result, community management has been placed in a strategic situation and a great managerial experiment. With the covid-19 pandemic, there have been global changes in the profitability of startups. The stock market crashed and there was recession and unemployment all over the world. In general, startups in digital markets performed better than traditional industries. Some time later, the digital economy began to adapt according to its original nature, business models changed and digital methods became more powerful than what was predicted, and technological solutions to overcome the challenges of Covid-19 were gradually applied in all industries. Hence, regardless of the current situation, measures related to Covid-19 have the potential to change the market again. The digital world's global response to Covid-19 is now taking place in the three areas of detection, diagnosis and prevention, and treatment, and digital companies' performance in risk and data analytics, health and wellness, crisis management, and education, in response to The Covid-19 pandemic has become more severe. Therefore, for the future, experts are both waiting for risk and looking for opportunities Manuscript profile