• Home
  • Hamid Jahankhani
Hamid Jahankhani

Hamid Jahankhani
  • BSc, MSc, PhD
  • Professor at Northumbria University London Campus

About

265
Publications
199,407
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,003
Citations
Current institution
Northumbria University London Campus
Current position
  • Professor

Publications

Publications (265)
Chapter
Geopolitical situations, such as the Ukraine–Russia war, the Israel–Hamas war, and pandemics, can disrupt supply chains, such as the rerouting of oil tankers via South Africa to avoid the impact of the Israel–Hamas conflict. These events will probably occur again, but they are black swan events and difficult to predict. How can firms manage these e...
Conference Paper
The User Datagram Protocol (UDP) is widely used in low-latency applications such as IoT, real-time systems, and streaming services due to its connectionless nature and minimal overhead. However, its stateless design introduces significant security vulnerabilities that traditional mechanisms like Datagram Transport Layer Security (DTLS) fail to addr...
Book
Full-text available
Agentic AI systems—such as AI-powered autonomous financial advisors that can initiate transactions, or robotic process agents capable of managing supply chain operations end-to-end—represent a powerful new generation of artificial intelligence. These systems are designed to pursue complex goals independently, with minimal or no ongoing human oversi...
Article
Full-text available
This paper proposes a novel machine learning-based approach to solve the resource allocation problem in 5G Open Radio Access Networks (O-RAN). While traditional methods rely on meta-heuristic optimization techniques such as Whale Optimization Algorithm (WOA), we present an ensemble learning framework that combines multiple advanced algorithms to ac...
Chapter
In today’s healthcare landscape, the demand for exchanging healthcare data across borders is escalating, but it comes with significant challenges such as privacy and regulatory compliance. The integration of Self-Sovereign Identity (SSI) with blockchain technology emerges as a promising solution. This research evaluates the significance of the SSI-...
Preprint
Full-text available
The emergence of quantum computing presents a significant challenge to the security of mission-critical applications such as satellite communications, business-to-business interactions, and critical infrastructure. As quantum computers have the potential to compromise current encryp-tion algorithms, there is an urgent need for robust, quantum-resis...
Chapter
Full-text available
In the era of generative AI, big data analytics, Business Analytics, and mega global digital corporations; the profession of marketing is at a crossroads between 'Prosumer-Marketing' and 'Market Grooming'. Whereas Prosumer (Producers + consumers) marketing means a process of exchange in which producers and consumers have equal, just, control, volun...
Chapter
Full-text available
The concept of 'intelligence' used to differ between human and machines, until the disruption of artificial intelligence (AI). The field of AI is advancing far more rapidly than the establishment of rules and regulations, which is causing certain fear. However, slowing down this progression to avoid economic crisis is not an option because of open-...
Technical Report
Full-text available
The document provides a comprehensive framework for ensuring the safety of agentic AI systems, which are AI models capable of autonomous decision-making and goal pursuit. It defines agentic AI, highlights its benefits and risks, and outlines principles for safer development and governance. The guidelines employ a Weighted Factors Methodology to bal...
Chapter
The field of Quantum Reinforcement Learning (QRL) has gained much attention in recent years within the domain of artificial intelligence (AI) and machine learning (ML). With the widespread acceptance of AI agents across diverse industries, it is imperative to augment their potential, effectiveness, and flexibility. Quantum Reinforcement Learning (Q...
Chapter
This research delves extensively into deepfake technology's substantial influence on cybersecurity, revealing its subtle aspects and potential social repercussions. The investigation begins with deciphering the practical process for generating deepfakes using DeepFace Lab, providing light on every tedious step from data extraction to model training...
Book
This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the po...
Chapter
Satellites have advanced from scientific wonders to vital components of our daily lives in modern society. These defined “artificial objects” provide worldwide communication, accurate navigation, Earth observation, national security and many more crucial services in our interconnected world. However, as our reliance on satellite technology grows, s...
Chapter
Space mining is a pioneering concept that involves extracting valuable resources from celestial bodies, such as asteroids, moons, and planets. This innovative approach holds immense potential for addressing earth resource shortages and supporting future space exploration endeavours. As humanity looks beyond our planet for sustainable solutions, spa...
Chapter
Ground-based satellite operations play a pivotal role in ensuring the seamless functioning of satellites orbiting our planet. These operations, however, are not immune to the ever-evolving landscape of cybersecurity risks and threats with the rise of quantum computing. The integrity, confidentiality, and availability of critical satellite data and...
Article
Full-text available
Recently, there has been a notable surge in the intricate complexities of global supply chain management (SCM), which is gaining researchers’ attention. Supply chain sustainability is put at risk by security issues in blockchain technology that affect everything from infrastructure to management. For sustainable supply chain management (SSCM), thes...
Thesis
Quantum computing is a disruptive technology that has the potential to revolutionize fields such as quantum physics, biology, economics, and cybersecurity. The impacts of quantum computing go beyond scientific research into the daily lives of ordinary people, not only because of its pros but also because it poses serious threats for modern telecomm...
Chapter
According to the PCI Security Standards Council, ensuring compliance with the Payment Card Industry Data Security Standard is essential for protecting sensitive cardholder data (Elluri et al. in An integrated knowledge graph to automate GDPR and PCI DSS compliance. IEEE, Seattle, WA, pp. 1266–1271, 2018 [1]). Maintaining PCI DSS compliance poses ad...
Chapter
Full-text available
In the modern age of technology, the term cloud computing is getting hype day by day. Cloud computing platform works based on on-demand services on the Internet due to the virtualization environment. The basic feature of this technology is that it provides pay as you use the model in which users are free to invest in the heavy cost of infrastructur...
Preprint
Full-text available
Geopolitical situations, such as the Ukraine–Russia war, the Israel–Hamas war, and pandemics, can disrupt supply chains, such as the rerouting of oil tankers via South Africa to avoid the impact of the Israel–Hamas conflict. These events will probably occur again, but they are black swan events and difficult to predict. How can firms manage these e...
Chapter
Information security remains a significant concern for virtually every well-established organization globally. Extensive research indicates that a significant proportion of information security breaches can be attributed to internal employees’ disregard for information security policies. Non-compliance with these policies is a complex issue that ne...
Chapter
Attacks using ransomware are increasing, putting current healthcare institutions and other crucial infrastructure at risk. The current healthcare administration systems could be a soft target, as evidenced by cyberattacks such as WannaCry incident in 2017, that affected just over one third of NHS trusts PCs and over 250,000 workstations in the majo...
Chapter
Zimbabwe is home to an expansive ore reserve estimated at 13 million metric tonnes. Despite its long mining history spanning a century, only 580 metric tonnes have been extracted, indicating a massive reservoir of untapped potential [Goosen M (2023) Top 5 minerals produced in Zimbabwe. Energy Capital Power]. However, this potential is hindered by s...
Conference Paper
The mounting prevalence of quantum computing poses a threat not only to conventional but also to futuristic network systems. As a result, today the focus shifts towards strengthening existing networks to secure sensitive data that may be threatened as a result of the potential for breaking present encryption protocols with the introduction of quant...
Book
Full-text available
Information and communication technology and social media are creating awareness and new stories about the role of technologies in creating sustainable cities, energy-efficient cities, smart cities, smart communities, green rooms and so on. Is there is any real potential, or it is a conflict of interest- ‘technology claims that technology the best...
Chapter
The importance of software-level communication security in ICS is growing as these systems become more automated and connected to the outside world. This chapter provides a secure-by-design approach to ICS application development, where design-time abstractions known as secure links are used to meet criteria from security protocols like ISA/IEC 624...
Chapter
The proliferation of technology is now exponential. Developments in technology, the increase in computer power and the reduction of cost, has allowed for greater accessibility, use and implementation of this technology in all sectors and industries. The evolution of smart and autonomous technologies, such as artificial intelligence and machine lear...
Chapter
The phenomenon of counterfeiting continues to grow steadily. According to Global Brand Counterfeiting (GBC in The Global Brand Counterfeiting Report, 2018), the volume of international trade in counterfeit goods reached 1.097 trillion euros in 2017 and will exceed 1.65 trillion euros in 2020. To minimize this growing trend, the following project un...
Chapter
The global pandemic forced many education establishments around the world to move to remotely learning. Criminals, have taken this opportunity to target vulnerable education institutions and carry out State-of-the-Art Cyber Attacks, exploiting flaws in their security systems by using social engineering methods and carrying out sophisticated high-pr...
Chapter
The world of Higher Education has become ever more complex with the expansion of global supply chains with numerous connected organisations, technological advancements, the recent demands of educational hybrid learning, and the growing importance attached to individuals’ data and its security. In many ways the pandemic has accelerated the acceptanc...
Chapter
A variety of businesses, academic institutions, and individual consumers have shown an interest in cloud computing since its inception in the last few years. This is due to the fact that cloud computing users are in a brand-new IT business paradigm. It holds the potential of moving away from a paradigm where businesses have to spend extensively on...
Chapter
A higher education system needs to ensure its teaching process and materials are aligned with the graduate employment market needs and expectations. If a university has built trust in the industry, it would be more likely to have its graduates to find suitable relevant jobs in the market. As a result, this will have positive feedback to absorb bett...
Chapter
The mining sector is worth trillions globally and the cornerstone of many developing nations wealth. National and corporate interests sit at the heart of negotiating fair value when pursuing profit while at the same time attempting to balance equality and sustainability of the sector. While the mining sector is of significant value to the economy,...
Chapter
Full-text available
Digital twin technology is used to enable businesses to create efficiencies by modelling their physical counterparts. Use cases include modelling a physical device through its lifecycle to perform predictive maintenance, product training, future product development, product performance enhancement, or using the digital twin to control its physical...
Chapter
Cyber security remains a relevant topic for organisations. While companies invest in expensive security tools security awareness training often is neglected, even though human error still accounts for a large part of cyber incidents (Gartner, 2022). At the same time there is currently an important generational shift, as Generation Z (Gen Z) is star...
Chapter
The world is progressing further into the digital era, and as a result, more and more people are getting their initial information from online news portals and social media platforms. The dependence on sources of information that are becoming murkier raises the likelihood of being deceived and the possibility of misguided agendas. When it comes to...
Chapter
This research presents the collection of data from different cybersecurity methodologies used for securing IoT environments, of which a few were chosen for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardenin...
Chapter
Full-text available
As the size of the population is growing and the capacity of the planet earth is limited, human beings are searching for sustainable and technology-enabled solutions to support society, ecology, and the economy. One of the solutions has been developing smart sustainable cities. Smart sustainable cities are cities as systems, where their infrastruct...
Chapter
Over recent years, technology has rapidly advanced and is accelerating the emergence to Industry 4.0, particularly due to the connectivity abundance, volume increase of smart devices, and a growing interconnectivity between humans and technology. Within the last two years, 90% of the data in the world today was generated and in the next few years t...
Book
Full-text available
The purpose of business is to deliver customer value and innovate. The net customer value for a business is the difference between demand-side revenue streams and Supply side-cost streams, Most of the technopreneurs have improved their Business Models by improving efficiencies on the demand side as well as supply-side and deliver better customer va...
Chapter
MiTM attack aims to violate data in transmission through the air medium in a wireless network; MITM exploits compromise data confidentiality and integrity and are conceivably the most productive types of cyberattacks utilised today. The increasing use of personal devices like smartphones connecting to the internet via Wi-Fi has made wireless attack...
Chapter
Cyberattacks have become a nightmare for businesses, often having to spend time and resources identifying one or mitigating another. The current research is an effort to develop an artificial intelligence-based security solution that can meet the SME demands of providing a security solution capable of detecting cyberattacks in real-time before they...
Chapter
Over the past decade, digitalization has played a greater role in improving the business stature of small business by opening new venues, extending their reach, and thereby improving value producing opportunities. It also brought the small businesses additional responsibilities of having to deal with the security risks and threats which are ever-pr...
Chapter
The exponential growth of Autonomous Intelligent Malware (AIM) has really changed the landscape in the cyber security fight against that attack of auto generated threats and how these threats needs to be dealt with. This research focuses on the use of Artificial Intelligence (AI), Machine learning (ML) and Deep learning (DL) to mitigate auto-genera...
Chapter
The exponential growth and advancements of information technology and artificial intelligence significantly enhance the capabilities of virtual agents. This creates opportunities for businesses such as banks to adapt virtual agents for banking operations. Security and privacy are the ultimate concern for any e-banking system or application. Therefo...
Chapter
The SARS-CoV-2 (Severe acute respiratory syndrome coronavirus 2) universally and commonly known as COVIT-19 and the across-the-board lockdown measures are having complex and unforeseen effects on intricate social domains, which includes opportunities for offline and online crimes. For some months since March 2020, most countries in the world if not...
Chapter
Malware is a huge category of software, generally designed with malicious intent. It has gained much attention in the media over last decade with a number of high-profile ransomware cases coming to light. Malware is often used as part of a kill chain in Advanced Persistent Threats (APTs) attacks. It can easily be developed using tools such as “Veil...
Chapter
Cybersecurity is a broad and active field of research, and one of the biggest and most prevalent risks in the area is malicious behaviour. One strategy involves intrusion detection, which is often a dynamic approach to address any suspicious behaviours or anomalies that have been observed. Another approach would proactively anticipate these malicio...
Chapter
With rapid advances in industrialisation and informalisation methodologies being attributed to industry 4.0, there is no surprise that Education 4.0 would want to harness those capabilities for its own use. Immersive ecosystems for teaching, utilising the benefits brought by augmented and virtual reality, offer a new horizon in learning, but also u...
Chapter
In December 2019, the world witnessed the start of a pandemic outbreak (Coronavirus or COVID-19) in Wuhan the capital of China’s Hubei province and from there quickly spread globally. The uncertainty and fear change represented a golden opportunity for threat actors. Early 2020 research discovered widespread evidence that threat actors embraced the...
Chapter
With the increased use of new technology in everyday applications, such as Artificial Intelligence, users rely on technology to guide them. What if a system that is trusted without a doubt can be manipulated and there are no warnings or detections? Even though users are being made aware of misinformation within social media and news outlets, we att...
Chapter
Human trafficking is a crime that has devastating impacts on all societies worldwide. Law enforcement and security organisations often encounter many obstacles in their endeavours to combat this crime. Effective measures to tackle human trafficking necessitate the fusion of a wide range of factors which together could produce the desired impact. On...
Chapter
Over the last decade, a noticeable growth in cyber-attacks has been recorded, pushing experts and specialists in cyber security for more advanced and sophisticated countermeasures to curb the spread of cyber-attacks. What needs to be addressed is the speed of which cybercrime is growing in the areas of critical national infrastructure; these can pr...
Article
Full-text available
Connected cars have a massive impact on the automotive sector, and whilst this catalyst and disruptor technology introduce threats, it brings opportunities to address existing vehicle-related crimes such as carjacking. Connected cars are fitted with sensors, and capable of sophisticated computational processing which can be used to model and differ...
Chapter
Human trafficking is a complex, burgeoning crime with a global foothold that impacts an estimated 40.3 million people worldwide. Currently, the number and the scale of innovation and technology tools do not correspond with the magnitude of the problem. There is little awareness about existing digital innovations and technology initiatives within th...
Chapter
The UK is keen to be part of the Global Space market that has seen the recent activities of Virgin Galactic and SpaceX. This research will take into consideration the UKs operability parameters in relation to International Space agreements to investigate whether the Governance surrounding Satellite communications prepares for the new Spaceports tha...
Chapter
Full-text available
The chapter focuses on building a theoretical network, which supports the protection of home networks from critical cyberattacks. A framework is proposed which aims to augment a home router with machine learning techniques to identify threats. During the current pandemic, employees have been working from home. So it is reasonable to expect that cyb...
Chapter
This paper discusses the need for measuring ethics for organisations that use and develop artificially intelligent software. The primary objective for this paper is to bridge the gap between artificial intelligence and ethics through the development of an ethical maturity framework that can be globally adopted and implemented through the design sta...
Conference Paper
Full-text available
Disability hate crime is under-reported in the UK with perceived limited support given to the victims. The use of online communication resulted in cyber-disability hate cases, recognised by the Police with the addition of an ‘online-flag’ in the documentation. However, the cases remain under-reported, with potential individual, societal and organis...
Chapter
Despite its many technological and economic benefits, Cloud Computing poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. By characterising th...
Chapter
The desire for eHealth systems is ever-growing as public institutions, healthcare providers, and its users see the positive gains from having systems of patient health information held in a single place; a decentralized connected architecture called blockchain. This concept can solve the interoperability issues and integrate the fragmented way heal...
Chapter
Mixed reality—the hybrid state that merges data with real life—is on the cusp of becoming mainstream, with technology pushing the boundaries of what the human mind can easily comprehend. This chapter is a review of the mixed reality landscape and use cases, giving examples of current/future attack mechanisms which could be leveraged against consume...
Chapter
The role of project management is changing dramatically in the backdrop of Industry 4.0 and the digital revolution. This exciting transformation is taking place in the next few years whilst embracing artificial intelligence (AI) technology into the body of the knowledge competencies. With this intelligence explosion, the influence of AI technology...
Chapter
The digital witness concept is underpinned by the Internet of Things (IoT) which brings serious privacy challenges and concerns. Digital witnesses deliver digital evidence to authorised entities by means of a digital chain of custody. This chapter provides an alternative approach by giving users behind the digital witness, the ability to disclose o...
Chapter
Recent global trends have led to the commodification of personal data, whilst the vast majority of users remain unaware or uninformed of the consequences of data mining and impacts of personal data exposure. This process has undeniably had a detrimental impact on the lives and privacy of users on a global scale, and whilst awareness of these concer...
Chapter
The aim of this chapter is to explore the role of digitisation and artificial intelligence (AI) on social media and in aiding brand awareness marketing—an approach to create, communicate, and deliver value offerings to customers. It proposes that consumers are ready for a new journey in which AI is a tool for endless options and information that ar...
Chapter
There are global discussions recognising the need for more development aid with jurisdictions such as the EU unveiling increased foreign aid budget for 2021–27 to deliver large increase in aid spending and eliminating the bureaucratic barriers. However, this increased flexibility gives rise to growing concerns on where aid is sent and that whole ch...
Book
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text...
Book
The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technol...
Chapter
In the current, fast paced development of computer hardware, hardware manufacturers often focus on an expedited time to market paradigm or on maximum throughput. This inevitably leads to a number of unintentional hardware vulnerabilities. These vulnerabilities can be exploited to launch devastating hardware attacks and as a result compromise the pr...
Chapter
In recent years, e-mails have become the most commonly used information and communication technology in organization. The email technology is susceptible to phishing attacks. Phishing attacks are a trending cybercrime activity and have caused a lot of financial loss using social engineered communication that are transmitted to individuals by cyberc...
Chapter
In light of the industry 4 evolution, the concerns regarding the data privacy seemed to rise due to the vast platforms and the adverse impacts that its data protection policies can have on people using it. In 2018, the European Union imposed a regulation called the general data privacy regulation (GDPR). The regulations aimed towards the protection...
Chapter
Phishing is an identity theft evasion strategy used in which consumers accept bogus emails from fraudulent accounts that claim to belong to a legal and real company in the effort to steal sensitive information of the client. This act places many users’ privacy at risk, and therefore researchers continue to work on identifying and improving current...
Book
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as...
Chapter
The traditional intrusion detection and Intrusion prevention systems are known as “signature based”, which means that they function in a similar method to a virus scanner by identifying the similar signatures for each intrusion event it detects. This specific method is very effective if the attacks are known, but for zero day attack it will not be...
Chapter
Malicious behaviour analysis is one of the biggest and most prevalent challenges in cybersecurity. With the dominance of the Android ecosystem, a significant number of frameworks were proposed to address the huge number of malicious attacks targeting the consumer base of this platform. Although still developing, the application of machine learning...
Book
The book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals. In recent years, AI has gained substantial attention from researchers in both academia and industry, and as a result AI’s capabilities are constantly increasing at an extraordinary pace. AI is considered to be the Fo...
Chapter
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This i...
Chapter
Without sufficient intelligence, police response to crimes occurs in the form a reactive retort. This is even more so in the case of cyberspace policing, as digital platforms increase the complexities involved in the overall police incident response development. In this paper, we briefly introduce cybercrime and the necessities that police forces h...
Chapter
The governance and supply chain of organs is a complicated process throughout the life cycle; from the outset of pre-assessment of organ placement, it's supply chain journey and important post donor analysis. Healthcare organisations face a huge challenge in the diverse collation of data that are held in systems which are mostly in silo operation a...
Chapter
The old adage, “seeing is believing”, no longer holds true in modern society. Digital media has paved the way for anyone to doctor images and for videos to misrepresent truth. The lines between fact, entertainment, advertising, fabrication and fiction are becoming increasingly blurred as what is termed ‘fake news’ increases in modern day society. A...
Chapter
IoT devices are becoming more prevalent in society, with an expected 21.5 Billion devices connected by 2025 [24], and when an incident occurs in the vicinity of such devices then they should be considered as potential digital evidence. A network of IoT devices is often referred to as a smart environment, or more frequently as a cyber physical syste...
Chapter
The governance and supply chain of organs is a complicated process throughout the life cycle; from the outset of pre-assessment of organ placement, it’s supply chain journey and important post donor analysis. Healthcare organisations face a huge challenge in the diverse collation of data that are held in systems which are mostly in silo operation a...
Chapter
This chapter centres on the emergence of technology in cases of Domestic Abuse using two adjunct parts; (1) how digital coercive control using smart home devices is now an attack vector for abusers and (2) it sets out to highlight the use of a governance model incorporating a risk-based approach following the principles of the Cyber Security Maturi...
Chapter
Advanced Persistent Threats (APTs) are destructive and malicious cyberattacks aimed at high profile, high value targets with clear objectives in mind with a range of desired outputs. In most cases, these threat groups are state sponsored which makes them extremely well financed, organised and resourced. The attack payloads range from data exfiltrat...
Chapter
The Internet of Things (IoT) are being enthusiastically adopted by consumers. By the year 2020 the sum of 31 billon IoT devices will be deployed globally. Subsequent as the IoT device landscape is expanding at such speed, so does the threat landscape and vulnerabilities it introduces increases. Thus, making IoT devices easily prone to attacks or to...
Chapter
This chapter centres on the emergence of technology in cases of Domestic Abuse using two adjunct parts; (a) how digital coercive control using smart home devices is now an attack vector for abusers and (b) it sets out to answer if the UK Domestic Abuse bill is adequate to support victims of technology facilitated abuse.
Chapter
The huge increase in data usage and the rapid development of new technologies such as cloud, IoT, and has also led to the exponential increase in cyber threats online. Anonymity and privacy services have equally seen an exceptional growth rate since the introduction of Blockchain and Tor network, as more individuals demand anonymous services away f...
Chapter
Blockchain and decentralised distributed ledger technologies are being viewed as a mechanism to provide further protection and enhance the security of data by using its properties of immutability, auditability and encryption whilst providing transparency amongst parties who may not know each other; so, operating in a trustless environment. It’s tru...
Chapter
With the development of automated and AI technology permeating into all sectors of public, private and industry life, the interconnectivity of once remote, siloed and air gapped systems is on the increase. Whilst this affords productive, streamlined and efficient ways of working, monitoring and maximise the effectivity of these systems, it is the c...
Chapter
5G, the fifth generation of wireless connectivity, is designed to allow long-distance coverage and stable connections as well as rapid data download and upload. As a result of 5G’s the wireless-based technology, the data migration enables a speed of 20 Gbps (Gigabyte per second) through wireless mobile data connections, which simplifies the managem...
Chapter
The speed and proliferation of AI and algorithmic technology has far outpaced that of the development of the legislative frameworks to which to govern them, to ensure their appropriate, safe and permissive use. It is not suggested that the development of these technologies and integrations are thwarted or inhibited, but more that there is a holisti...

Network

Cited By