300 resultados para Computers.
em Queensland University of Technology - ePrints Archive
Resumo:
Computers not only increase the speed and efficiency of our mental efforts, but in the process they also alter the problem-solving tasks we are faced with and, in so doing, they alter the cognitive processes we use to solve problems. Computers are fundamentally changing our forms of thinking (Colc & Griffin, 1980). Therefore, the computer should be seen as not only having the potential to amplify human mental capabilities, but also of providing a catalyst for intellectual development.
Resumo:
Computers are now being widely used in the making of music and the extent of computer use in the music that we hear is farlarger than most people realise. This paper will discuss how computer technology is used in music, with particular reference to music education.
Resumo:
At a time when distance learning and flexible delivery of university courses are increasing, spending long hours on computers, working from home or in the laboratory, raises some unique problems for students. The paper presents a theoretical framework for first year students which helps to explain the developmental process that many students find themselves going through during their transitional phase at university. It will introduce the concept taken from sports psychology of "staying in the zone of peak academic performance" in order to accomplish the task of obtaining a degree whilst at the same time ensuring physical and psychological health. Strategies used by therapists to assist students to continue successfully in their course of choice and to achieve desirable outcomes will be discussed.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.