Hamid Jahankhani

Learn More
The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, centres on evidence, the legal standards applied to digital evidence presented in court and the main sources of evidence in the Windows OS, such as the Registry,(More)
The People’s Republic of China (PRC) has a long tradition on military strategy. In the end of the 20 century this was one of the first nations to prepare itself for the new emerging concept of war that includes the combat in cyberspace, both with the intention to obtain privileged information (espionage), to reduce the enemy attack and/or military(More)
Managing security is essential for organizations doing business in a globally networked environment and for organizations that are at the same time seeking to achieve their missions and goals. However, numerous technical advancements do not always produce a more secure environment. All kinds of human factors can deeply affect the management of security in(More)
Evaluating existing initiatives for developing electronic government (e-government) in addition to identifying main challenges can provide valuable learning points in contributing towards efficient and effective implementation of e-government projects. The digital divide, issues of cyber security, privacy and primarily trust have been identified as the main(More)
London Plan is the London mayor’s Spatial Development Strategy. This strategic long-term plan comprises of proposals for different aspects of change within the London boundary. Furthermore, the proposals include chapters outlining adjustments in each facet. Policy 4A.2 reflects the Climate Change Mitigation scheme. Some consultations and research works have(More)