Amin Hosseinian-Far

Amin Hosseinian-Far
The University of Northampton | UN · Faculty of Business & Law

PhD MIET SFHEA FRSA

About

125
Publications
150,701
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,644
Citations
Introduction
Research Interests include: - IoT for Logistics - System’s Resilience and Sustainability - Applied Systems Analysis - Business and Strategic Information Systems - Information Seeking Behaviour and Satisficing - Information Security, Digital Forensics, System Safety and Ethics - Higher Education Research - Systematic Review
Additional affiliations
May 2017 - January 2018
The Open University (UK)
Position
  • Staff Tutor
May 2014 - May 2017
Leeds Beckett University
Position
  • Lecturer
January 2013 - May 2014
Williams College
Position
  • Managing Director
Education
September 2009 - August 2012
University of East London
Field of study
  • A Systemic Approach to an Enhanced Model for Sustainability
October 2008 - October 2009
University of Sussex
Field of study
  • Satellite Communications & Space Systems
January 2007 - September 2008
University of East London
Field of study
  • Business Information Systems

Publications

Publications (125)
Article
Full-text available
Due to the dynamic nature of the food supply chain system, food supply management could suffer because of, and be interrupted by, unforeseen events. Considering the perishable nature of fresh food products and their short life cycle, fresh food companies feel immense pressure to adopt an efficient and proactive risk management system. The risk mana...
Article
Full-text available
This paper aims to critically examine the potential barriers to the implementation and adoption of Robotic Process Automation (RPA) in the beef supply chain. The beef supply chain has been challenging due to its complex processes, activities, and management. The beef industry has relied heavily on the human workforce in the past; however, RPA adopt...
Chapter
This paper explores and analyses the impact of Predictive Analytics on Supply Chain Management. Predictive Analytics is expanding, and many organisations are utilising this technology for improved benefits and profits. The supply chain consists of different sectors which can inculcate this technology for overall optimization. This research uses pri...
Chapter
This chapter reveals the challenges that small, medium-sized enterprises in Singapore face when launching their data analytics strategies. It starts with a literature review regarding data analytics trends, followed by introducing commonly used terms, the historical development of data analytics, the types of data analytics, challenges, and framewo...
Article
Full-text available
Cardiac troponin T (cTnT) is a sensitive indicator of heart damage and an important clinical marker for acute myocardial infarction (MI). The recent development of a high-sensitivity cardiac troponin T (hs-cTnT) assay allows a more accurate diagnosis of serum cTnT level. There appears to be an association between Obstructive Sleep Apnea (OSA) and c...
Chapter
Digital Twins, as a suite of technologies is progressively developing significant momentum in several fields of study. Various research works have been conducted outlining the concept, the underlying technologies, general and context-specific architectures, and applications. This study has been undertaken to identify relevant research areas, key au...
Article
Full-text available
About half of the brain tumours are primary and the rest are metastatic. The impact of each of these treatments alone or together on the prognosis of patients with astrocytoma tumours, especially low-grade astrocytoma, is unclear which may pose many challenges in the decision-making of surgeons and patients. Considering the importance of patient's...
Preprint
Digital Twins, as a suite of technologies is progressively developing significant momentum in several fields of study. Various research works have been conducted outlining the concept, the underlying technologies, general and context-specific architectures, and applications. This study has been undertaken to identify relevant research areas, key au...
Article
UK legislation is to follow the moral views of society, has begun to incorporate CSR into legislation, forcing companies to conform the voluntary inclusion of CSR into the business framework beyond the legislated minima. Although the incorporation of CSR is a relatively new concept, the relevant legislation does not address certain key points; this...
Article
Full-text available
Background Breast cancer is one of the main causes of women's death. Breast cancer is the most common cancer in women over the world. Various studies have reported different incidences of breast cancer in women. However, we found no comprehensive study that showed the results of these studies in general, so the present study was conducted aimed to...
Article
Full-text available
Background Telemedicine has been introduced as a new and effective method in dealing with public health challenges, improving access to health care, and reducing healthcare costs in today's world. Insomnia is the most common sleep disorder that can be managed with cognitive behavioural therapy, however, access to skilled therapists is an issue. Te...
Article
Full-text available
Road trauma remains a significant public health problem. We aimed to identify sub-groups of motor vehicle collisions in Victoria, Australia, and the association between collision characteristics and outcomes up to 24 months post-injury. Data were extracted from the Victorian State Trauma Registry for injured drivers aged ≥16 years, from 2010 to 201...
Article
Purpose The aims and objectives of this research are to establish whether or not the transition into green building in high-rise construction is practical. This is after considering several perspectives including financial, economic, environmental, and social. This subsequently leads to an evaluation on whether or not the continuation with a standa...
Article
Sleep apnea (SA) is a common sleep disorder that is not easy to detect. Recent studies have highlighted ECG analysis as an effective method of diagnosing SA. Because the changes caused by SA on the ECG are imperceptible, the need for new methods in diagnosing this disease is required more than ever. Machine Learning (ML) is recognized as one of the...
Article
The local sensitivity analysis is recognized for its computational simplicity, and potential use in multi-dimensional and complex problems. Unfortunately, its major drawback is its asymptotic behavior where the prior to posterior convergence in terms of the standard metrics (and also computed by Fréchet derivative) used as a local sensitivity measu...
Article
Full-text available
Background Liver diseases are among the ten deadliest diseases in the world. Measuring PON1 is a test to assess the degree of liver disorder. There are several preliminary studies on the rate of PON1 activity in people with liver disease, and there are differences between the results of these studies; therefore, the aim of this research work is to...
Article
Full-text available
Abstract Purpose: Breast cancer is the most common cancer in women. In recent research works, the role of cytokines in development of cancer has attracted attention. Therefore, this paper intends to comprehensively assess the association between breast cancer and polymorphism A/T 251 from the IL-8 gene using meta-analysis. Methods: In this study,...
Article
Full-text available
The appraisal of appropriate levels of investment for devising flooding mitigation and to support recovery interventions is a complex and challenging task. Evaluation must account for social, political, environmental and other conditions, such as flood state expectations and local priorities. The evaluation method should be able to quickly identify...
Article
Full-text available
Background Positive Organizational Behavior (POB) as an application of positive psychology provides the opportunity to nurses to deliver an effective and high-quality service. This study aims to predict positive organizational behavior based on structural and psychological empowerment among Nurses. Method In this descriptive-analytical study, the...
Article
Advances in Internet of Things (IoT) and analytic‐based systems in the past decade have found several applications in medical informatics, and have significantly facilitated healthcare decision making. Patients' data are collected through a variety of means, including IoT sensory systems, and require efficient, and accurate processing. Topic Modell...
Article
Full-text available
Background: Within the UK, COVID-19 has contributed towards over 103,000 deaths. Although multiple risk factors for COVID-19 have been identified, using this data to improve clinical care has proven challenging. The main aim of this study is to develop a reliable, multivariable predictive model for COVID-19 in-patient outcomes, thus enabling risk-...
Chapter
Against the backdrop of organisational needs to derive value from IT Organisations through agility, efficiencies and cost effectiveness, many organisations have adopted a decentralised IT organisational structure, enabling individual business units the autonomy to implement, operate and govern technology. The increase risk that poses organisations...
Chapter
Digitalization and cybersecurity are two important trends that are affecting the business world tremendously. Digitalization, which drives data analytics, provides opportunities for organizations to create new models to beat competition. On the other hand, cybersecurity is a threat to organizations’ financials, operations, and reputation. COVID-19...
Chapter
Critical Business Processes (CBPs) are processes that are crucial to the financial stability and operations of an organisation. This paper focuses on surveying the literature, while presenting a critical synthesis of the findings of previous studies on CBPs. The paper seeks to extensively and critically review the current literature to understand s...
Chapter
Due to the increasing occurrence of disruptive events caused by both human and also natural disasters, supply chain risk management has become an emerging research field in recent years, aiming to protect supply chains from various disruptions and deliver sustainable and long-term benefits to stakeholders across the value chain. Implementing optimu...
Chapter
The typical purpose of software auditing is to assess the conformant of the developed software with the original plans, procedures, relevant regulations. Every audit involves several people with various roles in the auditing processes. The audit itself entails a number of preferable characteristics. In any audit engagement, the perceptions of the a...
Chapter
Organisations are facing sophisticated and advanced persistent threats (APT) that are targeting sensitive information assets. Any form of cyber-presence can be typically attacked by adversaries, and the motives of such attacks are context dependent. Besides, users and organisations are prone to software vulnerabilities, misconfigurations, outdated...
Chapter
The emergence of disruptive information systems has equipped many organizations with the competitive advantage to outperform their rivals. It has also resulted in production of varied and large volumes of data. Contemporary businesses have started to implement big data analytics to extract value and to inform their decisions. Big data analytics (BD...
Article
Full-text available
Background Translating research into practice is a central priority within the National Institutes of Health (NIH) Roadmap. The underlying aim of the NIH Roadmap is to accelerate the movement of scientific findings into practical health care provisions through translational research. Main text Despite the advances in health sciences, emerging infe...
Article
Full-text available
Background Coronary Artery Disease (CAD) is caused by the blockage of the coronary arteries. it is argued that there has an association between the Interleukin-6 gene and the occurrence of atherosclerosis, coronary artery disease, Due to the short half-life and high variability of Interleukin-6 (IL-6), limited studies have been performed on the ass...
Conference Paper
Critical Business Processes (CBPs) are processes that are crucial to the financial stability and operations of an organisation. This paper focuses on surveying the literature, while presenting a critical synthesis of the findings of previous studies on CBPs. The paper seeks to extensively and critically review the current literature to understand s...
Conference Paper
Against the backdrop of organisational needs to derive value from IT Organ-isations through agility, efficiencies and cost effectiveness, many organisa-tions have adopted a decentralised IT organisational structure, enabling indi-vidual business units the autonomy to implement, operate and govern tech-nology. The increase risk that poses organisati...
Conference Paper
Digitalization and cybersecurity are two important trends that are affecting the business world tremendously. Digitalization, which drives data analytics, provides opportunities for organizations to create new models to beat competition. On the other hand, cybersecurity is a threat to organizations’ financials, operations, and reputation. COVID-19...
Conference Paper
The typical purpose of software auditing is to assess the conformant of the developed software with the original plans, procedures, relevant regulations. Every audit involves several people with various roles in the auditing processes. The audit itself entails a number of preferable characteristics. In any audit engagement, the perceptions of the a...
Conference Paper
Due to the increasing occurrence of disruptive events caused by both human and also natural disasters, supply chain risk management has become an emerging research field in recent years, aiming to protect supply chains from various disruptions and deliver sustainable and long-term benefits to stake-holders across the value chain. Implementing optim...
Chapter
Despite its many technological and economic benefits, Cloud Computing poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. By characterising th...
Chapter
The emergence of disruptive information systems has equipped many organisations with the competitive advantage to outperform their rivals. It has also resulted in production of varied and large volumes of data. Contemporary businesses have started to implement big data analytics (BDA) to extract value and to inform their decisions. BDA and competit...
Article
Full-text available
Background Stress, anxiety, and depression are some of the most important research and practice challenges for psychologists, psychiatrists, and behavioral scientists. Due to the importance of issue and the lack of general statistics on these disorders among the Hospital staff treating the COVID-19 patients, this study aims to systematically revie...
Chapter
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This i...
Article
Full-text available
Background Human serum paraoxonase (PON) is an enzyme that is synthesized by the liver and enters the bloodstream, and it is transmitted by high-density lipoproteins (HDL). Paraoxonase 1 (PON1) is a hydrolytic enzyme with a wide range of substrates and the ability to protect against lipid oxidation. In this study, due to the activity of PON1 in the...
Article
Full-text available
Background: In all epidemics, healthcare staff are at the centre of risks and damages caused by pathogens. Today, nurses and physicians are faced with unprecedented work pressures in the face of the COVID-19 pandemic, resulting in several psychological disorders such as stress, anxiety and sleep disturbances. The aim of this study is to investigat...
Article
Full-text available
Background: Endometriosis is one of the most common causes of infertility. The causes of the disease and its definitive treatments are still unclear. Moreover, Anti-Mullerian Hormone (AMH) is a glycoprotein dimer that is a member of the transient growth factors family. This research work aimed to identify the effect of unilateral and bilateral lap...
Article
Full-text available
BackgroudPrevalence of skin lesions among diabetic patients is a major health concern. Therefore, this systematic review and meta-analysis study was conducted to determine the prevalence of skin lesions in diabetic patients.Methods To identify and select relevant articles, the SID, MagIran, IranMedex, IranDoc, Google Scholar, Cochrane, Embase, Scie...
Chapter
Without sufficient intelligence, police response to crimes occurs in the form a reactive retort. This is even more so in the case of cyberspace policing, as digital platforms increase the complexities involved in the overall police incident response development. In this paper, we briefly introduce cybercrime and the necessities that police forces h...
Chapter
The governance and supply chain of organs is a complicated process throughout the life cycle; from the outset of pre-assessment of organ placement, it's supply chain journey and important post donor analysis. Healthcare organisations face a huge challenge in the diverse collation of data that are held in systems which are mostly in silo operation a...
Article
Full-text available
Background: Acceptance and Commitment Therapy (ACT), as a type of behavioral therapy, attempts to respond to changes in people's performance and their relationship to events. ACT can affect sleep quality by providing techniques to enhance the flexibility of patients' thoughts, yet maintaining mindfullness. Therefore, for the first time, a systemat...
Article
Full-text available
Although regulations and established practices in academia have focused on a data-rich model of performance information, both to evidence operational capability and to support recruitment, it is considered that this approach has been largely ineffective in addressing student choice behaviour. Historical studies, business, psychology, and technology...
Article
Many biological and biomedical research areas such as drug design require analyzing the Gene Regulatory Networks (GRNs) to provide clear insight and understanding of the cellular processes in live cells. Under normality assumption for the genes, GRNs can be constructed by assessing the nonzero elements of the inverse covariance matrix. Nevertheless...
Chapter
The governance and supply chain of organs is a complicated process throughout the life cycle; from the outset of pre-assessment of organ placement, it’s supply chain journey and important post donor analysis. Healthcare organisations face a huge challenge in the diverse collation of data that are held in systems which are mostly in silo operation a...
Article
Full-text available
Background: The COVID-19 pandemic has had a significant impact on public mental health. Therefore, monitoring and oversight of the population mental health during crises such as a panedmic is an immediate priority. The aim of this study is to analyze the existing research works and findings in relation to the prevalence of stress, anxiety and depr...
Article
The high velocity, variety and volume of data generation by today's systems have necessitated Big Data (BD) analytic techniques. This has penetrated a wide range of industries; BD as a notion has various types and characteristics, and therefore a variety of analytic techniques would be required. The traditional analysis methods are typically unable...
Article
Disaster remains a major concern especially from a global perspective. Various occurrences of natural disasters over the decades shaped the way humans most importantly those in disaster prone regions of the world now live their lives. However, the construction of residential buildings within high risk regions with keen emphasis on Indian Himalayas...
Article
Considering the ever-growing ubiquity of technology, there is an associated growth in the possibility of digital devices being related to a criminal investigation or civil litigation. As the variety of digital devices is increasing, the storage capacity of each is also rising exponentially. Due to the varied and large volumes of data produced, law...
Article
Abstract: The rapid increase in the pervasiveness of digital devices, combined with their heterogeneous nature, has culminated in increasing volumes of diverse data, aka big data, that can become subject to criminal or civil investigations. This growth in big digital forensic data (DFD) has forced digital forensic practitioners (DFPs) to consider s...
Article
There are certain vulnerabilities associated with computing hardware that attackers can exploit to launch destructive attacks which often go undetected by the existing hardware and software countermeasures. Side Chanel Attacks (SCAs) and Rowhammer Attacks (RHAs), the consequences of hardware vulnerabilities, pose significant security and privacy th...
Preprint
Full-text available
Abstract Announcement for International Journal of Strategic Engineering (IJoSE) 2(2) The contents of the latest issue of: International Journal of Strategic Engineering (IJoSE) Volume 2, Issue 2, July - December 2019 Published: Semi-Annually in Print and Electronically ISSN: 2572-4959; EISSN: 2572-4967Published by IGI Global Publishing, Hershey, U...
Chapter
The field of digital forensics still lacks formal process models that courts can employ to determine the reliability of the process followed in a digital investigation. The existing models have often been developed by digital forensic practitioners , based on their own personal experience and on an ad-hoc basis, without attention to the establishme...
Book
Part I – Digital Twins and Smart Cities 1. The Convergence of Digital Twin, IoT and Machine Learning: Transforming Data into Action- Authors: Maninder Jeet Kaur, Ved P. Mishra, and Piyush Maheshwari 2. A Novel Approach Towards Enhancing the Quality of Life in Smart Cities using Clouds and IoT Based Technologies - Authors: Kamta Nath Mishra, and C...
Poster
The poster outlines a doctoral proposal on developing a framework for the identification of Critical Business Processes (CBPs). The framework will provide a clear guideline to the responsible managers for implementing business continuity (which is entirely dependent on CBP identification), without seeking external support. Moreover, it will provide...
Article
There are several vulnerabilities in computing systems hardware that can be exploited by attackers to carry out devastating microarchitectural timing-based side-channel attacks against these systems and as a result compromise the security of the users of such systems. By exploiting microarchitectural resources, adversaries can potentially launch di...