001446490 000__ 03826cam\a2200529Ia\4500 001446490 001__ 1446490 001446490 003__ OCoLC 001446490 005__ 20230310004001.0 001446490 006__ m\\\\\o\\d\\\\\\\\ 001446490 007__ cr\un\nnnunnun 001446490 008__ 220507s2022\\\\sz\a\\\\o\\\\\000\0\eng\d 001446490 019__ $$a1314257532$$a1314429117 001446490 020__ $$a9783030982256$$q(electronic bk.) 001446490 020__ $$a3030982254$$q(electronic bk.) 001446490 020__ $$z9783030982249$$q(print) 001446490 020__ $$z3030982246 001446490 0247_ $$a10.1007/978-3-030-98225-6$$2doi 001446490 035__ $$aSP(OCoLC)1314608322 001446490 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dYDX$$dN$T$$dOCLCF$$dWAU$$dUKAHL$$dOCLCQ 001446490 049__ $$aISEA 001446490 050_4 $$aQA76.9.A25 001446490 08204 $$a005.8$$223/eng/20220512 001446490 24500 $$aBlockchain and other emerging technologies for digital business strategies /$$cHamid Jahankhani, David V. Kilpin, Stefan Kendzierskyj, editors. 001446490 260__ $$aCham :$$bSpringer,$$c2022. 001446490 300__ $$a1 online resource (vi, 316 pages) :$$billustrations 001446490 336__ $$atext$$btxt$$2rdacontent 001446490 337__ $$acomputer$$bc$$2rdamedia 001446490 338__ $$aonline resource$$bcr$$2rdacarrier 001446490 4901_ $$aAdvanced Sciences and Technologies for Security Applications 001446490 5050_ $$a1. Digital leadership models, strategies and traits -- 2. Social Media, Challenges and Strategies in 5G and 6G -- 3. Cyber Security defence including Ransomware attacks for Small and Medium-Sized Businesses in the digital economy -- 4. Information Governance, security and e-Governance -- 5. The role of AR/ VR and Holographic technology in corporate decision making -- 6. 5G in vertical market transformation -- 7. IoT, IoMT, IIoT and IoNT -- 8. Blockchain and smart contracts -- 9. Zero trust security strategies and guideline -- 10. Predicting Algorithms shaping outcomes through manipulation. 001446490 506__ $$aAccess limited to authorized users. 001446490 520__ $$aThis book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem. The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and masters degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills. 001446490 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 12, 2022). 001446490 650_0 $$aComputer security. 001446490 650_0 $$aBlockchains (Databases) 001446490 655_0 $$aElectronic books. 001446490 7001_ $$aJahankhani, Hamid,$$eeditor. 001446490 7001_ $$aKilpin, David V.,$$eeditor 001446490 7001_ $$aKendzierskyj, Stefan,$$eeditor. 001446490 77608 $$iPrint version:$$aJahankhani, Hamid$$tBlockchain and Other Emerging Technologies for Digital Business Strategies$$dCham : Springer International Publishing AG,c2022$$z9783030982249 001446490 830_0 $$aAdvanced sciences and technologies for security applications. 001446490 852__ $$bebk 001446490 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-98225-6$$zOnline Access$$91397441.1 001446490 909CO $$ooai:library.usi.edu:1446490$$pGLOBAL_SET 001446490 980__ $$aBIB 001446490 980__ $$aEBOOK 001446490 982__ $$aEbook 001446490 983__ $$aOnline 001446490 994__ $$a92$$bISE