The implementation of authentic activities for learning: a case study
The situated cognition theory of learning advocates that students should engage in the same types of activities in which expert practitioners in the various disciplines engage. Situated cognition promotes the use of authentic activities for learning and understanding. This paper reports the findings...
| Main Author: | Baccarini, David |
|---|---|
| Format: | Conference Paper |
| Published: |
Murdoch University
2004
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/10786 |
Similar Items
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003)
by: Green, Peter, et al.
Published: (2003)
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)
by: Green, Peter
Published: (2002)
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004)
by: Green, Peter
Published: (2004)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Giving virtual world learning a pedagogical boost with a gamified authentic learning design
by: Teräs, H., et al.
Published: (2014)
by: Teräs, H., et al.
Published: (2014)
Investigation of potential cognition factors correlated to fire evacuation
by: Yan, Jingjing, et al.
Published: (2020)
by: Yan, Jingjing, et al.
Published: (2020)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
‘Well I don’t feel that’: schemas, worlds and authentic reading in the classroom
by: Giovanelli, Marcello, et al.
Published: (2015)
by: Giovanelli, Marcello, et al.
Published: (2015)
Enhancement of student learning and attitude towards mathematics through authentic learning experiences
by: Blum, Kathleen Mary
Published: (2002)
by: Blum, Kathleen Mary
Published: (2002)
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016)
by: Knudsen, Daniel C., et al.
Published: (2016)
Testing the Role of Authenticity in Cultural Tourism Consumption: A Case of Mauritius
by: Ramkissoon, Haywantee, et al.
Published: (2010)
by: Ramkissoon, Haywantee, et al.
Published: (2010)
Influence of positive organisational behaviour and authentic leadership towards organisational performance: a case study
by: Chay, Guo Wei
Published: (2020)
by: Chay, Guo Wei
Published: (2020)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Gamification in logistics and supply chain education: Extending active learning
by: Wood, Lincoln, et al.
Published: (2012)
by: Wood, Lincoln, et al.
Published: (2012)
Transforming the culture of teaching and learning in science: the promise of moral dilemma stories: an interpretive case study
by: Settelmaier, Elisabeth
Published: (2003)
by: Settelmaier, Elisabeth
Published: (2003)
Measuring Consumer-Based Brand Authenticity
by: Napoli, Julie, et al.
Published: (2014)
by: Napoli, Julie, et al.
Published: (2014)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
The paradox from within: research participants doing-being-observed
by: Hazel, Spencer
Published: (2015)
by: Hazel, Spencer
Published: (2015)
Incongruity between pedagogy of authenticity and contemporary educational apparatus: person-centred phenomenological studies
by: Plust, Urszula
Published: (2023)
by: Plust, Urszula
Published: (2023)
Developing Authentic and Virtual E-Learning Environments
by: Veenendaal, Bert, et al.
Published: (2005)
by: Veenendaal, Bert, et al.
Published: (2005)
Musical stage theory: a novel account for the ontology of musical works and the authenticity of music
by: Moruzzi, Caterina
Published: (2018)
by: Moruzzi, Caterina
Published: (2018)
Efficient, Authentication and Access control Implementation in Mobile Ad hoc Networks (MANET) as applied to Indoor Navigation Guidance System for Vision Impaired People
by: Rupasinghe, Prabath, et al.
Published: (2012)
by: Rupasinghe, Prabath, et al.
Published: (2012)
Leading authentically- a prosocial engagement model for middle level bureaucrats in Malaysia
by: Ahmad, Hal Mahera
Published: (2023)
by: Ahmad, Hal Mahera
Published: (2023)
Contesting authentic practice and ethical authority in adventure tourism
by: Rickly, J.M., et al.
Published: (2017)
by: Rickly, J.M., et al.
Published: (2017)
Getting real in the language classroom: developing Japanese students' communicative competence with authentic materials
by: Gilmore, Alexander
Published: (2008)
by: Gilmore, Alexander
Published: (2008)
Reflective learning journals for construction education - a case study
by: Baccarini, David
Published: (2004)
by: Baccarini, David
Published: (2004)
Operationalising gamification in an educational authentic environment
by: Reiners, Torsten, et al.
Published: (2012)
by: Reiners, Torsten, et al.
Published: (2012)
The politics of protest in newspaper campaigns:
dissent, populism and the rhetoric of authenticity
by: Birks, Jen
Published: (2011)
by: Birks, Jen
Published: (2011)
Authenticity and Diversity: Enhancing Australian Hepatitis C Prevention Messages
by: Winter, R., et al.
Published: (2013)
by: Winter, R., et al.
Published: (2013)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Optimization of storage conditions for the detection of Heat Shock Protein 70 (HSP70) from salivary glands of field collected Aedes albopictus / Nur Azimah Sulong
by: Sulong, Nur Azimah
Published: (2015)
by: Sulong, Nur Azimah
Published: (2015)
Authentic assessment and the Internet: contributions within knowledge networks
by: Allen, Matthew
Published: (2009)
by: Allen, Matthew
Published: (2009)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Physical activity and academic achievement in children: A historial perspective
by: Howie, Erin, et al.
Published: (2012)
by: Howie, Erin, et al.
Published: (2012)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Time, space and situations in an internet bulletin board service
by: Dell, Peter
Published: (2010)
by: Dell, Peter
Published: (2010)
'Woodpushers are gay': The role of Provocation in Bullying
by: Burns, Sharyn, et al.
Published: (2008)
by: Burns, Sharyn, et al.
Published: (2008)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Similar Items
-
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003) -
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002) -
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004) -
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019) -
Giving virtual world learning a pedagogical boost with a gamified authentic learning design
by: Teräs, H., et al.
Published: (2014)