769 search results

Machines, minds and computers
Digital & Computing

Machines, minds and computers

...psychological investigations of these processes. Strong artificial intelligence looks to imitate human mental processes with the aim of building computer systems that are intelligent in the same way as humans, and may even be sentient in the way that humans are. Weak or strong, artificial intelligence and the computer are inextricably bound together. Stripping away...
An introduction to interaction design
Science, Maths & Technology

An introduction to interaction design

...psychology, sociology, graphic design and product design. Because it is difficult for one person to be an expert in all relevant disciplines, interaction design benefits from the collaboration of a multidisciplinary team, where different experts contribute to the process. For example, psychologists can offer important insights into the way in which prospective users might...
Effective communication in the workplace Badge icon
Money & Business

Effective communication in the workplace

...Psychology Today, Russell (2016) lists a number of characteristics of a workplace where trust is in action. Many of them relate to communication, including: Ideas are shared freely; contribution, collaboration, innovation, and cooperation thrive. Victim thinking, finger-pointing, and negative storytelling are infrequent. Regular feedback and dialogue is commonplace....
Understanding musical scores
History & The Arts

Understanding musical scores

...psychology of silence in music. These small silences articulate the musical space, so you need to be able to identify rests and places in large scores where instruments are silent in order to understand what is happening and to follow them through. Essentially, you will need to move your eye to the active lines of music not the resting ones. Figure 8 Mozart’s fifth...
Level 1: Introductory 12 hrs
Assessing contemporary science
Science, Maths & Technology

Assessing contemporary science

...Psychological Association’s annual convention. Therefore you would have to search for the associated publication which was only published much later in September 2017 in Frontiers in Ecology and the Environment: https://doi.org/10.1002/fee.1518 Headline exaggerated? No, uses the word ‘seems’. No independent comment? Yes, only researchers quoted. ‘Higher risk’?...
Level 2: Intermediate 9 hrs
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST) Badge icon
Digital & Computing

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

...forensics experts to investigate computer systems which can be abused by attackers. The CMA has been successfully used in a wide range of criminal cases including denial-of-service attacks against Kent Police, Oxford University, the United States Air Force, the CIA, Sony and Nintendo; fraudulent activities in online games; illegal access and disclosure of confidential...
Introduction to cyber security: stay safe online Badge icon
Digital & Computing

Introduction to cyber security: stay safe online

...forensics experts to investigate computer systems which can be abused by attackers. The CMA has been successfully used in a wide range of criminal cases including denial-of-service attacks against Kent Police, Oxford University, the United States Air Force, the CIA, Sony and Nintendo; fraudulent activities in online games; illegal access and disclosure of confidential...
Deall datganoli yng Nghymru
Society, Politics & Law

Deall datganoli yng Nghymru

...forensic capacity of Welsh Journalism as resources and revenue options continue to shrink. The primary issues relating to news journalism in Wales are sustainability and plurality. It is becoming more difficult for Wales to retain its visibility to itself and portray the reality of relevant issues beyond its borders to the rest of the UK, and further afield. (Senedd...
Level 1: Introductory 12 hrs