Search results for "Authentic"

showing 10 items of 203 documents

Współczesny (neo)nomadyzm a edukacja kulturowa

2014

The aim of the article is to notice the cultural-cognitive character of the contemporary travel. Chasing the exotic, understood as a trial to save the authentic, has gained much strength in the world threatened by cultural unification. The vision of the world not touched by the Western culture has become a perfect selling material. This trend has been confirmed by incredibly popular traveling programs, as well as a rich and original offer of the traveling agencies, tempting clients with meeting the world of the Masai, Hamer or Mursi tribes. In the age of globalization the cultural tourism is an important alternative to mass travel, mainly aimed at entertainment.

autentycznośćpodróżenomadyzmcultural educationturystyka kulturowacultural tourismnomadismauthenticitymityzacja przestrzeniturystykatourismspace mythizationedukacja kulturowatravelAnnales Universitatis Paedagogicae Cracoviensis. Studia de Cultura
researchProduct

Four Concepts of Politics

2016

Four concepts of politics follow from an attempt to view the established order, its structural workings: actions and inactions, as more or less authentic politics by starting from Slavoj Žižek’s theory of authentic Political Act. In short Žižek’s theory is viewed from a slightly different angle in an attempt to approach more general theory of politics. When analysing political antagonisms, Žižek has suggested looking for the third term. Viewing an antagonism from both of its viewpoints suggest, however, that instead of one position more, two conceptual positions more may be formulated. These two positions are proposed to be viewed as (in)acts of both corresponding sides. What is called ‘Pol…

authentic political actSlavoj Žižek
researchProduct

Wine and Terroir(s) : an Identity between Myth and reality

2020

To speak about wine is obviously a sign of socialization, but is also a trend, which is part of the global interest in gastronomy. In order to build up discourses on wine, which heavily draw on marketing communication, referring to AOP and AOC labels and classifications does seem to be necessary but not sufficient, as the notion of ‘terroir’ has become prominent in many discourses and on a variety of media. The crave for authenticity and proximity permeates gastronomy and oenology markets, and the idea of terroir alone seems capable of just responding to this crave. Terroir can be seen as a warrant of identity offered by wine growers and makers, but is also demanded by consumers in quest of…

authenticityauthenticitéstorytellingterroir[SHS.INFO]Humanities and Social Sciences/Library and information sciencespatrimoinecultural heritage[SHS.INFO] Humanities and Social Sciences/Library and information sciencesidentityidentité
researchProduct

Using movies in EFL teaching : the point of view of teachers

2011

Koska kieltenoppijat ovat nykypäivänä entistä homogeenisempi ryhmä, kaivataan vieraan kielen opetukseen vaihtelevia ideoita ja opetusmetodeja. Elokuvat ovat muun muassa autenttisuutensa ja monikanavaisuutensa vuoksi hyödyllinen keino opettaa vierasta kieltä, myös englantia vieraana kielenä. Tutkimuksen tavoitteena oli selvittää, miten suomalaiset englanninopettajat käyttävät elokuvia omassa opetuksessaan ja mitä mieltä he ovat elokuvien käytöstä viidellä eri kieltenopetuksen osa-alueella: suullisen kielitaidon, kirjoittamisen, sanaston, kieliopin ja kulttuurin opettamisessa. Tutkimus toteutettiin internet-kyselynä kevään 2011 aikana. Vastaajat valittiin satunnaisesti Länsi-Suomen eri kaupun…

authenticitykieltenopettajatmoviesEFL teachingautenttisuuselokuvatEFL teachersoppimateriaali
researchProduct

The role of teaching experience in the use of authentic materials in EFL teaching

2014

Autenttisten materiaalien käyttö vieraiden kielten opetuksessa on ollut kielitieteellisen tutkimuksen kiinnostuksen kohteena jo vuosikymmenien ajan. Tutkimus on kuitenkin pääasiassa painottunut autenttisuuden käsitteen määrittelyyn ja autenttisten materiaalien hyötyihin. Erityisesti opettajien autenttisten materiaalien käyttöä ja koulutuksen sekä opetuskokemuksen vaikutusta opetusmateriaalien valintaan on tutkittu hyvin vähän. Tällainen tutkimus on kuitenkin erityisen tärkeää, kun halutaan selvittää kieltenopettajien saaman koulutuksen sekä kokemuksen mahdollista vaikutusta kielten opetuksessa tehtäviin valintoihin. Tämä vertaileva tapaustutkimus pyrkii selvittämään kokemuksen roolia lukion…

authenticitylearning materials
researchProduct

Propos historiques sur l'authenticité

2010

authenticité[SHS.DROIT]Humanities and Social Sciences/Law[SHS.DROIT] Humanities and Social Sciences/Lawauthenticité notariale[ SHS.DROIT ] Humanities and Social Sciences/Law
researchProduct

Les enjeux de la transparence en gastronomie. Ethique et toques

2021

International audience; Le concept de transparence se décline dans tous les domaines et revisite la gastronomie. Il s'apparente à la traçabilité, l'authenticité, la proximité des hommes et des produits. La transparence s'affiche dans les restaurants, sur le menu, dans la cuisine elle-même. Les chefs y ont également recours en adaptant leurs menus aux attentes sociales et sociétales des clients et se forgent une identité particulière.

authenticité[SHS.INFO]Humanities and Social Sciences/Library and information sciencesGastronomieproximitétransparence[SHS.INFO] Humanities and Social Sciences/Library and information sciencesComputingMilieux_MISCELLANEOUS[SHS]Humanities and Social Sciences
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Biometric Features for Mobile Agents Ownership

2005

Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …

biometric authentication systemsmulti-agent systems security.ComputingMilieux_LEGALASPECTSOFCOMPUTINGagent ownershipComputingMethodologies_ARTIFICIALINTELLIGENCE
researchProduct

An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite Assisted Internet of Things

2022

Recently, integrating satellite networks (e.g. Low-earth-orbit satellite constellation) into the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more reliable, ubiquitous and seamless network services. The LEO satellite networks serves as a key enabler to transform the connectivity across industries and geographical border. Despite the convenience brought from the LEO satellite networks, it arises security concerns, in which the essential one is to secure the communication between the IoT devices and the LEO satellite network. However, some challenges inheriting from the LEO satellite networks need to be considered : 1) the dynamic topology; 2) the resource…

blockchaintodentamineninternet of thingLEO satellite networksalausAuthentication schemetietoliikennesatelliititesineiden internetlohkoketjuttietoturvalangattomat verkot
researchProduct