Search results for "Authentic"

showing 10 items of 203 documents

Honouring the opening: Unfolding the rich ground between the philosophical thinking of Martin Heidegger and practice-based empirical work

2021

The aim of this article is to bring philosophical thinking closer to practice-based empirical work. Using Martin Heidegger’s philosophy, it offers a bridge between these two worlds, attempting to provide philosophical depth to the findings of a hermeneutic phenomenological study. This process unfolded through the appearance of three intertwined, potential, meaningful modes of being in the lifeworld: space as a condition for being and being for worlding the world; temporal and spatial self-being, the existence of multiple selves in time and space; and suffering and thriving as modes of being. The article extends the dialogue and concludes with key reflections and insight for research practic…

Empirical workaivoinfarktivuorovaikutuseksistenssiPhilosophyfallingfenomenologiaBeing in the worldBridge (interpersonal)strokesairaanhoitajatEpistemologyPhenomenology (philosophy)aivohalvausThrownnesspotilaathermeneutiikkaauthenticityPhilosophical thinkingdwellingthrownnessfilosofiabeing-in-the-worldmerkitys (tärkeys)autenttisuus
researchProduct

Reducing the Cost of Being the Boss: Authentic Leadership Suppresses the Effect of Role Stereotype Conflict on Antisocial Behaviors in Leaders and En…

2021

What drives entrepreneurs to engage in antisocial economic behaviors? Without dismissing entrepreneurs’ agency in their decision-making processes, our study aims to answer this question by proposing that antisocial economic behaviors are a dysfunctional coping mechanism to reduce the psychological tension that entrepreneurs face in their day-to-day activities. Further, given the overlap between the male gender role stereotype and both leader and entrepreneur role stereotypes, this psychological tension should be stronger in female entrepreneurs (or any person who identifies with the female gender role). We argue that besides the well-established female gender role – leader role incongruence…

Entrepreneurshipeconomic gamesentrepreneur role stereotypeCheatingmedia_common.quotation_subjectfemale entrepreneurshipStereotypeDysfunctional familyRole conflictantisocial behaviorsPsychologyGender roleGeneral PsychologyOriginal Researchmedia_commonLideratgeEmpreses Direcció i administracióEconomia Aspectes psicològicsBF1-990Authentic leadershipleader-entrepreneur role incongruencePsychologySocial psychologyLyinggender-entrepreneur role incongruenceFrontiers in Psychology
researchProduct

Brand stores' functions : an approach through brand experience

2022

In-store brand experience leverages brand equity and customer equity which are clear value sources for brands (literature review and exploratory studies). The experience quality is linked to its capacity to meet these goals. Compared to generalist distributors and multi-brand experiences, brand stores are dedicated and focused. They are key places since service and experience items are crafted by the brand itself. The brand is therefore able to grant a genuine, i.e., authentic brand experience (brand content recognition and brand authentication through in-store experience). It is less the case in its distributors’ stores, where brand experience competes with its competitors’ and its distrib…

Expérience de marqueBrand experienceBrand consumer relationshipRetailExpérience en magasinRelationShopping experienceDistribution[SHS.GESTION] Humanities and Social Sciences/Business administrationQualityQualitéAuthenticityAuthenticité
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

2020

Healthcare data in cloud computing facilitates the treatment of patients efficiently by sharing information about personal health data between the healthcare providers for medical consultation. Furthermore, retaining the confidentiality of data and patients' identity is a another challenging task. This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system. The proposed model offers a high-security guarantee and high efficiency. The proposed digital system consists of four different entities, user, data owner, cloud server, and key generation center (KGC). This approach makes…

FOS: Computer and information sciencesKey generationComputer Science - Cryptography and Security020205 medical informaticsbusiness.industryComputer science020206 networking & telecommunicationsAccess controlCloud computing02 engineering and technologyMutual authenticationEncryptionPublic-key cryptographyData sharingComputer Science - Computers and SocietyComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringSession keybusinessCryptography and Security (cs.CR)Computer network2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Usability analysis of a novel biometric authentication approach for android-based mobile devices

2014

Mobile devices are widely replacing the standard personal computers thanks to their small size and user-friendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine int…

Fingerprints authenticationOperating systemComputer Networks and CommunicationMobile device securityUsabilityElectrical and Electronic Engineering
researchProduct

Authentication of berries and berry-based food products.

2021

Abstract Berries represent one of the most important and high-valued group of modern-day health-beneficial “superfoods” whose dietary consumption has been recognized to be beneficial for human health for a long time. In addition to being delicious, berries are rich in nutrients, vitamins, and several bioactive compounds, including carotenoids, flavonoids, phenolic acids, and hydrolysable tannins. However, due to their high value, berries and berry-based products are often subject to fraudulent adulteration, commonly for economical gain, but also unintentionally due to misidentification of species. Deliberate adulteration often comprises the substitution of high-value berries with lower valu…

FlavonoidsberriesspectroscopyBerryfood authenticationAuthentication (law)DietHuman healthFood productsFruitchromatographyHumansDNA barcodingBusinessFood scienceFood ScienceComprehensive reviews in food science and food safetyREFERENCES
researchProduct

Chromatographic fingerprint of the volatile fraction of rare Hedera helix honey and biomarkers identification

2018

Hedera helix (Irish ivy) honey is a very rare food product used in Ireland. The composition of the volatile fraction of this unique honey was studied for the first time using three different extraction procedures (SPE, USE and HS–SPME) and analyzed with gas chromatography and mass spectrometry. As expected, the use of combined techniques resulted in the identification of the detailed composition of honey volatiles. Identified constitutes belongs to the different chemical classes. The presence of 4(1H)-quinolinone, myrtenal and phenylacetonitrile was proposed as biomarkers of the botanical origin of ivy honey. Moreover, they are not widely widespread among honeys of different botanical origi…

Fraction (chemistry)Mass spectrometry01 natural sciencesBiochemistryIndustrial and Manufacturing EngineeringHPTLC0404 agricultural biotechnologyHedera helixhoney volatilesBiochemical markersChromatographyHS–SPMEbiologyChemistry010401 analytical chemistry04 agricultural and veterinary sciencesGeneral Chemistrybiology.organism_classification040401 food science0104 chemical scienceshoney authenticationivy honeyFood productsChromatographic fingerprintGas chromatographyFood ScienceBiotechnologyEuropean Food Research and Technology
researchProduct

The authenticity of ‘authentic’ assessment some faculty perceptions

2017

The attempt to embed Authenticity within the learning process in higher education has been a driving principle within many pedagogical approaches to Higher Education developed over the past three decades. The desire to allow students to learn in a manner that closely resembles the way in which expertise is developed outside the academic environment is a central element of problem-based, inquiry-based and projectbased learning. Exploring the implications of authenticity for student achievement and the ways in which this should be assessed has led to innovative teaching methods and ways of evaluating student performance. Unfortunately, authenticity, and authentic assessment in particular, are…

Further educationSituated learningcurriculumauthentic learningpsychologytietotekniikkainformation technology0502 economics and businessMathematics educationCurriculum developmentta516computer sciencesSocial learning theoryta11305 social sciences050301 educationauthentic achievementProject-based learningProblem-based learningAuthentic assessmentpsykologiaauthentic assessmentInquiry-based learning0503 education050203 business & managementreflection2017 IEEE Frontiers in Education Conference (FIE)
researchProduct

RVVS 2013

2013

GFLVauthenticitécoordinationdéterminisme génétiquecouvre-solexsudatsespace sensorielsouches hypoagressivesco-suppressionvinsélectionrésistanceŒnotourismemodélisationterritoireImpact environnementalprémunition au vignoblechangement climatiquepratique culturale innovantecommunicationviticulture durablemaladies du boisnématicidebio-contrôlesauvegarde[SDV] Life Sciences [q-bio]variétésécotoxicitédiversité génétiquecourt-nouésols viticoles - fertilité des sols
researchProduct