Perceived Authenticity of California Missions
نویسندگان
چکیده
منابع مشابه
Authenticity in Learning Game: How It Is Designed and Perceived
A key concern in game-based learning is the level of authenticity games require in order to match what learners can expect in the real world, what keeps them engaged in the game, and what they need to learn. We examined authenticity or credibility in a game from the learner’s perspective. There are very few studies on this aspect. We propose that authenticity is the result of a compromise betwe...
متن کاملPerceived Salesperson Authenticity in B2B-Relationships: A Qualitative Study
Marketing research is just beginning to understand customers’ need for authenticity in marketing exchanges. While consumers seek authentic brands and consumption experience, industrial buyers appreciate authentic salespersons. However, marketing literature is silent about perceived salesperson authenticity. This paper’s aim is to make an advance in closing this research gap. Therefore, we conce...
متن کاملAuthenticity in Adolescents and Young Adults' Relationships: The Roles of Emotion Regulation and Perceived Parental Feedback
....................................................... 4 Introduction ........................................................ 5 Method ........................................................... 21 Results ........................................................... 27 Discussion ........................................................... 35 References ............................................
متن کاملHighlight disparity contributes to the authenticity and strength of perceived glossiness.
The disparity of highlights on specular reflecting surfaces usually differs from the disparity of the surface points. A. Kirschmann (1895) proposed that this fact may be used as a binocular cue for gloss perception. This was confirmed by A. Blake and H. Bülthoff (1990) who found that subjects judged the glossiness of convex ellipsoidal surfaces as most realistic if the disparity of the highligh...
متن کاملRelaxed Authenticity
In-network data aggregation allows energy-efficient communication within a sensor network. However, such data aggregation introduces new security challenges. As sensor nodes are prone to node-compromise, a fraction of nodes might act maliciously and forge aggregated data. For arbitrary aggregation functions, the verification of authenticity of aggregated data, i.e., its correctness, integrity, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Focus
سال: 2012
ISSN: 1549-3776
DOI: 10.15368/focus.2012v9n1.5