541 search results

Creating open educational resources
Education & Development

Creating open educational resources

...mathematics being used in an everyday setting and has audio clips too to talk the learner through some pictures of ‘mathematical musings’. It is clear that assumptions have been made about the intended learner. For example, Play, learning and the brain was written for a teacher or helper working in something like a nursery or similar education setting, so it has a...
Mastering systems thinking in practice Badge icon
Science, Maths & Technology

Mastering systems thinking in practice

...mathematical modeller and writer on complex systems, says that: … when we speak of something being complex, what we are doing is making use of everyday language to express a feeling or impression that we dignify with the label complex. (Casti, 1994) He also argues that the meaning we give to the term complex is dependent on the context. Complexity is not just a matter...
Risk management Badge icon
Money & Business

Risk management

...mathematical models or ‘gut feel’. Both approaches have their merits, but in its most basic form the aim is to understand what is the relative order or importance of the risks. [Probability and Impact Diagram (PID)] Figure 2 Probability and Impact Diagram (PID) The most common approach to assess a risk uses two dimensions: impact and probability. This approach is...
Level 1: Introductory 24 hrs
Applying to study for a PhD in psychology
Health, Sports & Psychology

Applying to study for a PhD in psychology

...podcast. Record a short video. Pick the option that you think reflects your abilities. Discussion Self-presentation skills are included here because PhD study always involves contacts with other people. In addition to the interaction involved in reading someone else’s work, you will get in touch more directly with the authors of papers and other academics whose work...
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST) Badge icon
Digital & Computing

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

...podcast and an email newsletter. Troy Hunt provides analyses of different system breaches and useful hints on how to avoid being attacked. Activity 3 Knowing your enemies Timing: Allow about 15 minutes Cybercriminal: those carrying out cyber attacks for personal financial gain. Spies: those engaged in espionage activities on behalf of either commercial organisations or...
Introduction to cyber security: stay safe online Badge icon
Digital & Computing

Introduction to cyber security: stay safe online

...podcast and an email newsletter. Troy Hunt provides analyses of different system breaches and useful hints on how to avoid being attacked. Before you can identify your enemies you need to know who you can trust. First you need to think about, and constantly evaluate who and what you trust, and to what degree you trust them. You cannot rigorously check every possible...
Exploring anxiety
Science, Maths & Technology

Exploring anxiety

...podcasts, video clips, news articles, and radio or televised broadcasts − aimed at specific audiences – policy makers, funding councils, professional bodies, charitable organisations, the mass media and the general public, amongst others. Complex issues that are tackled by research in today’s global society increasingly require a multidisciplinary approach and...
Level 3: Advanced 9 hrs
The psychology of cybercrime
Health, Sports & Psychology

The psychology of cybercrime

...podcasts) get information (search, blogs) news (including online newspapers, magazines) online games banking work (either earning money online or using the internet to work remotely) shopping education other access. You might have put online fraud (such as issues around scams and various security breaches when paying or banking online. You might have thought about more...