AI, Blockchain and Self-Sovereign Identity in Higher Education

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning?

The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education.

The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

Author(s): Hamid Jahankhani, Arshad Jama, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt
Series: Advanced Sciences and Technologies for Security Applications
Publisher: Springer
Year: 2023

Language: English
Pages: 314
City: Cham

Contents
The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Higher Education Supply Chains
1 Evolution of Education and Its Supply Chain Relationship
1.1 Technology Advancements in Education
1.2 Education Supply Chain
1.3 Relationships in the Education Supply Chain
1.4 Increasing Risks to Education in Cyberattacks
2 Managing Data Security Using Blockchain, DID and SSI
2.1 Blockchain Variations
2.2 Beneficial Attributes Common Across Blockchain
2.3 Decentralised Digital Identities (DID)
2.4 Self-Sovereign Identity and Internet of Things
3 The Role of Artificial Intelligence in Education
4 Higher Education Cyber Security Maturity Model with Blockchain
4.1 Cyber Security Maturity Model (CSMM) Framework
4.2 Cyber Risk Standards
4.3 Statement of Applicability (SoA)
4.4 Governance of the CSMM Supply Chain Framework
5 Conclusions
References
Fighting the Tide—GPT and an Alarming Sense of Déjà Vu
1 Introduction
1.1 A Brief Review of GPT-3
2 Don’t Understand This, Lets Ban It!
3 An Alarming Sense of Deja Vu
4 A Post GPT Academia
References
Embedding AI in Higher Education: A Call for a Service Design Approach
1 Introduction
2 Digital Tools to Address Student Success Challenges
3 Adopting a Service Design Approach
4 Ethical Implication of Using AI in University’s Settings
5 Conclusions
References
An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework
1 Introduction
2 Ransomware Attack
3 The Impacts of Ransomware Attacks
3.1 Security Landscape in Education
3.2 State-Sponsored Attacks
4 Cybercrime and Cyber Extortion
4.1 Motives Behind Cyber Extortion
5 An Overview of Cybersecurity Maturity Models
5.1 Maturity Model Components
5.2 Related Work on Maturity Models
6 Research Methodology
6.1 Research Design
6.2 Quantitative Research
6.3 Significance Level
6.4 Calculating the Statistic Test and Corresponding P-Value
6.5 Conducting a One Sample t Test
6.6 Interpreting Results
6.7 Drawing Conclusions
6.8 Conducting a One Sample t Test
6.9 Drawing Conclusions
7 Cybersecurity Maturity Model Certification, CMMC
7.1 Implementation
8 Ethical and Legal Aspects
9 Critical Discussions
References
Strategic Decision-Making for Pedagogical Course Planning Using NLP in Social Media Data
1 Introduction
2 Literature Review
2.1 Higher Education Recommendation Systems
2.2 Job Requirements and Experts’ Profile Data
2.3 Recommendation Systems Techniques
3 Research Methodology
3.1 Data Science Model
4 Data Processing and Analysis
4.1 NLP Data Pre-processing
4.2 Data Analysis
4.3 Analytics Review of the Results
5 Conclusion
References
The Use of Virtual Learning Environments in Higher Education—Content, Community and Connectivism—Learning from Student Users
1 Introduction
2 VLEs Types
3 AI and Analytics Driven Student Support and Teaching
4 Machine Learning, SMS Messaging, and AI to Optimise Student Services and Support
5 Using VLEs to Drive Connected Learning Communities
6 Creating Connected Learning Communities Through a VLE
7 Immersive VLE
8 Research into Practice
9 Conclusions
References
Influence of Artificial Intelligence in Higher Education; Impact, Risk and Counter Measure
1 Introduction
2 Methodology
3 Capacity Analysis the AI Tools
4 Analysis of the Survey and Interview Result
4.1 Interviewing the Professors and Doctorate Students
5 The Impact of AI Tools on Education
6 Proposed Integrated Framework
7 Challenges of This Study
8 Limitations of Our Study
9 Conclusion
References
Development of a Decentralized Personal Indefinable Information (PII) Management Systems Using Blockchain dBFT Consensus Algorithm
1 Introduction
2 Literature Review
2.1 Personal Data
2.2 PII and Privacy
2.3 Information Management System
2.4 Blockchain for Identity Management System
2.5 Related Works
3 Research Methodology
3.1 Methodology Justification
3.2 Approach to Critical Analysis of Previous PII Management System
3.3 Search Parameters
3.4 Search Methods
3.5 Analysis Methods
3.6 Choosing Decentralise Technology
3.7 Modelling of Proposed DApp for PII Management System
3.8 Ethical Considerations
4 Research Design and Models
4.1 Review Summary
4.2 Designing Dapp Models for PII Management System
4.3 User-case Diagram
4.4 Design Data Collection Models
4.5 Infrastructure Design
4.6 Smart Contract
4.7 Developing dBFT App Smart Contract Using Neo 3
5 Critical Discussions
6 Conclusion and Future Work
References
Security Framework for Big Data Usage in Cloud-based e-Learning Application
1 Introduction
2 Literature Review
2.1 Big Data Attributes
2.2 Big Data and Cloud-based e–Learning Application
3 Security in the Middleware Application
3.1 Security of Data in Motion
3.2 Security of Data at Rest
3.3 Securing the Data at Rest Using a Cryptographic Method
3.4 Attacks on AES Cipher Suite
4 Challenges in Cloud Based e-Learning Application
4.1 Security Breach
4.2 Misconfiguration in the Appliances
5 Cloud Data Security
6 Research Methods
6.1 Proposed Framework
6.2 Experimental Setup
6.3 AES (Advance Encryption Algorithm)
6.4 AES Implementation Using Python3
6.5 Chacha20 Implementation Using Python3
7 Data Analysis and Critical Discussion
References
A Proactive Approach to Protect Cloud Computing Environment Against a Distributed Denial of Service (DDoS) Attack
1 Introduction
2 Literature Review
2.1 DDoS Attack Prevention and Detection
2.2 IP Traceback Method
2.3 Threat Intelligence
2.4 Proxy Server
2.5 Port Hopping Technique
3 Research Methodology
3.1 Layer 1 Logic and Concept
3.2 Layer 2 Logic and Concept
3.3 Layer 3 Logic and Concept
3.4 Layer 4 Logic and Concept
4 Results and Analysis
4.1 Virtual Environment Configuration
4.2 Layer One Implementation
4.3 Layer Two Implementation
4.4 Layer Three Implementation
4.5 Layer Four Implementation
4.6 Overall Operation Implementation
4.7 Method Comparison
References
Ransomware Attack on the Educational Sector
1 Introduction
2 Cybersecurity Threats and Challenges
2.1 Cybersecurity Definition
2.2 Pillars of Cybersecurity—The CIA Triad
2.3 The Challenges of Cyber Attacks
2.4 Ransomware
2.5 History of Ransomware
3 Most Common Attacks of Ransomware on Individuals and Organisations
3.1 Individuals
3.2 Organisations
3.3 There Are Several Common Methods Used to Distribute and Spread Ransomware to End-Users, Some of the Most Common Include
3.4 Impact on Cyber Physical Systems
3.5 Most Popular Cyber-Attacks on Industrial Control Systems
3.6 Impact of Ransomware on Education Sector
4 Education Sector
4.1 The Role of the Education Sector in an Economy
4.2 Technology in Education Sector
4.3 Cybersecurity Challenges in the Education Sector
4.4 Why the Education Sector is a Target of Ransomware
4.5 Popular Ransomware Attacks on the Educational Sector
5 Mitigation Strategy
5.1 Future Adoptions
5.2 The Exponential Growth of Dependency of the Educational Sector on Technologies, Potential Benefits, Potential Drawbacks, Concerns, and Ethical Issues in Education
6 Digital and Modern Education
6.1 Edtech
7 Educational Tools by Category
7.1 Business Continuity
8 Conclusion
9 Summary
References