001469981 000__ 05170cam\\22006737i\4500 001469981 001__ 1469981 001469981 003__ OCoLC 001469981 005__ 20230803003356.0 001469981 006__ m\\\\\o\\d\\\\\\\\ 001469981 007__ cr\un\nnnunnun 001469981 008__ 230626s2023\\\\sz\a\\\\o\\\\\000\0\eng\d 001469981 019__ $$a1386700318 001469981 020__ $$a9783031336270$$q(electronic bk.) 001469981 020__ $$a3031336275$$q(electronic bk.) 001469981 020__ $$z9783031336263 001469981 020__ $$z3031336267 001469981 0247_ $$a10.1007/978-3-031-33627-0$$2doi 001469981 035__ $$aSP(OCoLC)1386257293 001469981 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCF 001469981 049__ $$aISEA 001469981 050_4 $$aLB1028.43 001469981 08204 $$a378.00285/63$$223/eng/20230626 001469981 24500 $$aAI, blockchain and self-sovereign identity in higher education /$$cHamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt, editors. 001469981 264_1 $$aCham :$$bSpringer,$$c2023. 001469981 300__ $$a1 online resource (vi, 313 pages) :$$billustrations (some color). 001469981 336__ $$atext$$btxt$$2rdacontent 001469981 337__ $$acomputer$$bc$$2rdamedia 001469981 338__ $$aonline resource$$bcr$$2rdacarrier 001469981 4901_ $$aAdvanced sciences and technologies for security applications,$$x2363-9466 001469981 5050_ $$a1. The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Higher Education Supply Chains -- 2. Fighting the Tide : GPT and An Alarming Sense of Déjà Vu -- 3. Embedding AI in Higher Education: a call for a service design approach -- 4. An empirical study into Ransomware campaigns against the Education Sector & adopting the Cybersecurity Maturity Model Certification Framework -- 5. Strategic Decision-Making for Pedagogical Course Planning using NLP in Social Media -- 6. The Use of Virtual Learning Environments in Higher Education : Content, Community and Connectivism – Learning From Student Users -- 7. Influence of Artificial Intelligence in Higher Education; Impact, Risk and Counter Measure -- 8. Development of a Decentralized Personal Indefinable information (PII) management systems using Blockchain DBFT consensus Algorithm -- 9. Security Framework for Big Data usage in cloud-based e-learning application -- 10. A proactive approach to protect cloud computing environment against a Distributed Denial of Service (DDoS) attack. 001469981 506__ $$aAccess limited to authorized users. 001469981 520__ $$aThis book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning? The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education. The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills. 001469981 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed June 26, 2023). 001469981 650_0 $$aArtificial intelligence$$xEducational applications. 001469981 650_0 $$aEducation, Higher$$xData processing. 001469981 650_0 $$aBlockchains (Databases) 001469981 655_0 $$aElectronic books. 001469981 7001_ $$aJahankhani, Hamid,$$eeditor. 001469981 7001_ $$aJamal, Arshad$$c(Associate Dean),$$eeditor. 001469981 7001_ $$aBrown, Guy$$q(Guy Matthew),$$eeditor. 001469981 7001_ $$aSainidis, Eustathios,$$eeditor. 001469981 7001_ $$aFong, Rose,$$eeditor. 001469981 7001_ $$aButt, Usman J.$$eeditor. 001469981 77608 $$iPrint version: $$z3031336267$$z9783031336263$$w(OCoLC)1376748986 001469981 830_0 $$aAdvanced sciences and technologies for security applications,$$x2363-9466 001469981 852__ $$bebk 001469981 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-33627-0$$zOnline Access$$91397441.1 001469981 909CO $$ooai:library.usi.edu:1469981$$pGLOBAL_SET 001469981 980__ $$aBIB 001469981 980__ $$aEBOOK 001469981 982__ $$aEbook 001469981 983__ $$aOnline 001469981 994__ $$a92$$bISE