Results 51 to 60 of about 80,549 (150)
Negotiating Authentic Objects and Authentic Selves [PDF]
Our understanding of authenticity in the material world is characterized by a problematic dichotomy between materialist and constructivist perspectives. Neither explains why people find the issue of authenticity so compelling, nor how it is experienced and negotiated in practice. There is strong evidence supporting the view that prevailing materialist
openaire +2 more sources
Artificial worlds and artificial minds: Authenticity and language learning in digital lifeworlds
Language learning is increasingly being extended into digital and online spaces that have been enhanced by simulated reality and augmented with data and artificial intelligence.
Blair Matthews
doaj +1 more source
Authenticity, authentication and experiential authenticity: telling stories in museums [PDF]
This article examines how different types of authenticity and authentication work together to inspire museum stories, and personal identification with them, in ways that encourage experiential authenticity. It begins by outlining conceptions of object and existential authenticity and demonstrating how they are bound up with processes of hot and cool ...
openaire +1 more source
Language, Task and Situation: Authenticity in the Classroom
There is debate on the use of authenticity in language classrooms in terms of language, task, and situation. “Authenticity of language” spans a continuum that begins with inauthentic materials – wholly created by a teacher or materials developer – to ...
Ken Beatty
doaj +1 more source
Detecting of forgery of an Aivazovsky's Oil Painting [PDF]
prof.Moustafa Attia
doaj +1 more source
Authentic or comfortable? What tourists want in the destination
Authenticity is a popular research topic in tourism studies and is an important destination attribute that influences tourists and their decision-making.
Linsi He +2 more
doaj +1 more source
Ten years ago Natalie Davis and I decided to put together a special issue of Representations we would call "Memory and Counter-Memory…
Randolph Starn
doaj +1 more source
Keyless Authentication and Authenticated Capacity
We consider the problem of keyless message authentication over noisy channels in the presence of an active adversary. Different from the existing models, in our model, the legitimate users do not have any pre-shared key for authentication. Instead, we use the noisy channel connecting the legitimate users for authentication.
Wenwen Tu, Lifeng Lai
openaire +1 more source
In Pursuit of Authenticity in Science Education
This article presents a systematic review of how authenticity is used in science education research and discusses the implications these uses have for the design of science education classroom practices.
Jens Anker-Hansen, Maria Andreé
doaj +1 more source
This research focuses on identifying the authenticity of signatures, which is an important part of the field of biometrics. Identification of signature authenticity has wide applications, including in document security, financial transactions, and ...
Angela Citra Vidyanti +2 more
doaj +1 more source

