• OpenAccess
    • List of Articles challenges

      • Open Access Article

        1 - The Fourth Industrial Revolution and the Necessary Approaches for Scientific, Economic and Industrial Policymakers
        Ali Akbar Safavi
        Undoubtedly, the developments resulting from new technologies in recent years have changed the way views and all scientific, social, economic and industrial dimensions in the world. These changes are increasing much faster than before, and therefore aware people in any More
        Undoubtedly, the developments resulting from new technologies in recent years have changed the way views and all scientific, social, economic and industrial dimensions in the world. These changes are increasing much faster than before, and therefore aware people in any society, both from an individual and managerial position, prepare for these changes, and vulnerable individuals and communities (from an intellectual, managerial, and program perspective). They will lag behind the caravan of growth and excellence day by day. For example, a brief and even simple look at the effects of information and communication technologies over the past few decades can shed light on changes in social interactions, the shape of national and international markets, economic approaches, and security issues. The fourth wave of industry or (Industry 4.0) is one of these technological developments that is taking place as a revolution and with the same common meaning of revolution. The fourth industrial wave refers to the fourth industrial revolution. This revolution will change production processes, make supply chains and production processes more interconnected, efficient and flexible, and expand the discussion of customization and virtual production.Everyone is talking about the fourth wave of industry. But what exactly does this mean? And what was it before that? The purpose of this article is a comprehensive review of future developments and technologies and their effects on industry and other dimensions of society. Understanding the emerging digital developments, we need to review the results of research and possible guidelines or solutions. In this way 1. Policies and roadmaps that all related industries should pursue to succeed in the future; 2. Theoretical as well as practical challenges and possible related solutions, 3. Changes in managerial and educational approaches and the contents of scientific disciplines, Will be mentioned. Manuscript profile
      • Open Access Article

        2 - Secure Computing on the Internet of Everything
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, More
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, including systems, smart devices, industrial systems, and many others. With the immense number of connected objects, information security, and privacy have become significant challenges in IoT computing. This article explores the concept of secure computing in the Internet of Everything. It investigates the impact of the Internet of Things on the concept of security and its related needs. Furthermore, the methods and technologies used to establish secure computing in the Internet of Everything are discussed, including topics such as data encryption, identification and authentication, access management, privacy protection, and threat detection. Additionally, the challenges and drawbacks of secure computing in the Internet of Everything are examined, addressing issues such as the complexity of the connected environment, dynamic security threats, the need for standards and security-related concerns, and the influence of technological changes on secure computing. Finally, solutions and recommendations are provided to enhance secure computing in the Internet of Everything, including the use of strong encryption, centralized access management, user education and awareness, and advanced threat detection and monitoring systems. This article aims to provide a better understanding of secure computing in the Internet of Everything and to develop suitable security solutions for this domain. Manuscript profile
      • Open Access Article

        3 - Achievements and Challenges of Women Empowerment in knowledge-based Companies
        Leila Falahati
        The present research was conducted with the aim of investigating the achievements and challenges of women's empowerment in knowledge-based companies. In this research, the opportunities and challenges of graduates women in knowledge-based companies were discussed based More
        The present research was conducted with the aim of investigating the achievements and challenges of women's empowerment in knowledge-based companies. In this research, the opportunities and challenges of graduates women in knowledge-based companies were discussed based on the analysis of twenty interviews with women’s board members or directors in this field. Concerning to obtain relative superiority in order to design questions and categorize the content of documents and interviews, empirical literature related to the research was reviewed. Result revealed that three major factors have motivated them to start their own business including: the desire to balance work and life, the desire to earn more money, and the desire to develop business skills. In the field of agency and factors affecting women's entrepreneurship in the knowledge-based environment, entrepreneurial characteristics and behaviors such as results achievement, risk-taking, and self-confidence have been measured. From organizational and environmental aspects, organizational capacities including trust, access to resources and information, networking skills, ability to generate resources, financial knowledge, technology skills and having role models were influential. In terms of challenges, there are Individual factors (lack of courage, high emotions, low level of specialized and technical knowledge related to work and slowness of women), Socio-cultural factors (discrimination, common gender stereotypes, religious norms and beliefs and lack of knowledge and proper socialization) and Economic factors (discrimination in hiring and payment of wages, negative attitude of customers and financial institutions and prejudices) were addressed as obstacles to the effective participation of women in knowledge-based companies Manuscript profile