Using Authentic Multimedia Cases to Connect with Industry
The Harvard style teaching case is a tried and true teaching method in business schools around the world. However, this method has its flaws. Multi-media teaching cases address concerns associated with realism, authenticity and professionalism. This paper presents adelivery model that facilitates th...
| Main Authors: | Vibert, C., Chang, Vanessa |
|---|---|
| Other Authors: | Jan Herrington |
| Format: | Conference Paper |
| Published: |
AACE
2013
|
| Online Access: | http://www.editlib.org/p/111990 http://hdl.handle.net/20.500.11937/44651 |
Similar Items
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
Dual authentication for bluetooth connection
by: Saliou, Diallo Alhassane, et al.
Published: (2014)
by: Saliou, Diallo Alhassane, et al.
Published: (2014)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Operationalising gamification in an educational authentic environment
by: Reiners, Torsten, et al.
Published: (2012)
by: Reiners, Torsten, et al.
Published: (2012)
Industrial strength wireless multimedia sensor network technology
by: Potdar, Vidyasagar, et al.
Published: (2016)
by: Potdar, Vidyasagar, et al.
Published: (2016)
Malaysian multimedia content industry
by: Badi, Maimona J., et al.
Published: (2015)
by: Badi, Maimona J., et al.
Published: (2015)
Authentic learning as a case of becoming
by: Parnell, Renee, et al.
Published: (2012)
by: Parnell, Renee, et al.
Published: (2012)
Cipta connects students to industries
by: The Borneo Post
Published: (2016)
by: The Borneo Post
Published: (2016)
Suruhanjaya Komunikasi dan Multimedia (SKMM) bertindak agresif mengisi pembangunan industri multimedia negara
Published: (2008)
Published: (2008)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
The implementation of authentic activities for learning: a case study
by: Baccarini, David
Published: (2004)
by: Baccarini, David
Published: (2004)
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Authenticity perceptions, brand equity and brand choice intention: The case of ethnic restaurants
by: Lu, A., et al.
Published: (2015)
by: Lu, A., et al.
Published: (2015)
Political connections and strategic choices of emerging market firms: Case study of Russia’s pharmaceutical industry
by: Klarin, Anton, et al.
Published: (2019)
by: Klarin, Anton, et al.
Published: (2019)
Fingerprint authentication system using MATLAB
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
Poetics of Authenticity
by: Burenius, Axel
Published: (2023)
by: Burenius, Axel
Published: (2023)
Draw a line on your PDA to authenticate
by: Liu, Xiyang, et al.
Published: (2010)
by: Liu, Xiyang, et al.
Published: (2010)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Heritage tourism in Singapore Chinatown: A perceived value approach to authenticity and satisfaction
by: Lee, Sean, et al.
Published: (2015)
by: Lee, Sean, et al.
Published: (2015)
Authentic, immersive and emotional experience in virtual learning environments: The fear of dying as an important learning experience in a simulation
by: Reiners, Torsten, et al.
Published: (2014)
by: Reiners, Torsten, et al.
Published: (2014)
Wireless multimedia sensor networks: a survey
by: Potdar, Vidyasagar, et al.
Published: (2009)
by: Potdar, Vidyasagar, et al.
Published: (2009)
Authentication of electronic evidence in cybercrime cases
based on Malaysian laws
by: Mustapa Sa’di, Mursilalaili, et al.
Published: (2015)
by: Mustapa Sa’di, Mursilalaili, et al.
Published: (2015)
A Case Study Of Multimedia University's Security Management
by: Arumugam, Kesavan A.
Published: (2005)
by: Arumugam, Kesavan A.
Published: (2005)
A Comparative Study Of Reading Authentic And Non-Authentic Text
by: Zainal, Zaidah, et al.
Published: (2010)
by: Zainal, Zaidah, et al.
Published: (2010)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016)
by: Knudsen, Daniel C., et al.
Published: (2016)
Collaborative information system: connecting the government, university, and industry
by: Hasan, Muhammad Rabiul, et al.
Published: (2011)
by: Hasan, Muhammad Rabiul, et al.
Published: (2011)
Convergence, Connectivity, and the Case of Japanese Mobile Gaming
by: Chan, Dean
Published: (2008)
by: Chan, Dean
Published: (2008)
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013)
by: Shojanazeri, Hamid
Published: (2013)
Wireless multimedia sensor network technology: a survey
by: Sharif, Atif, et al.
Published: (2009)
by: Sharif, Atif, et al.
Published: (2009)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
Certificate authentication system using QR code
by: Chan, Ming Ting
Published: (2014)
by: Chan, Ming Ting
Published: (2014)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
Adoption and Implementation of IT Governance: Cases from Australian Higher Education
by: Bhattacharjya, Jyotirmoyee, et al.
Published: (2006)
by: Bhattacharjya, Jyotirmoyee, et al.
Published: (2006)
Adoption and implementation of IT governance: cases from Australian higher education
by: Bhattacharjya, J., et al.
Published: (2008)
by: Bhattacharjya, J., et al.
Published: (2008)
Using multimedia in developing Islamic website
by: Zeki, Akram M., et al.
Published: (2015)
by: Zeki, Akram M., et al.
Published: (2015)
Using multimedia to teach Arabic literature
by: Ahmad H.Osman, Rahmah
Published: (2010)
by: Ahmad H.Osman, Rahmah
Published: (2010)
Using multimedia in teaching Islamic studies
by: Wan Jusoh, Wan Noor Hazlina, et al.
Published: (2009)
by: Wan Jusoh, Wan Noor Hazlina, et al.
Published: (2009)
Testing the Role of Authenticity in Cultural Tourism Consumption: A Case of Mauritius
by: Ramkissoon, Haywantee, et al.
Published: (2010)
by: Ramkissoon, Haywantee, et al.
Published: (2010)
Similar Items
-
Multimedia encryption, transmission and authentication
Published: (2011) -
Dual authentication for bluetooth connection
by: Saliou, Diallo Alhassane, et al.
Published: (2014) -
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014) -
Operationalising gamification in an educational authentic environment
by: Reiners, Torsten, et al.
Published: (2012) -
Industrial strength wireless multimedia sensor network technology
by: Potdar, Vidyasagar, et al.
Published: (2016)