Looped Learning Sample Clauses

Looped Learning. The learning that takes place within organisations is often described as a dichotomy; with the key difference being whether learning takes place within existing norms, practices and mental models or seeks to modify those underlying norms, practices and mental models. These two types of learning have been variously described as lower and higher-level learning (Xxxx & Xxxxx, 1985), low and meta- level learning (Xxxxxxx, 1981), first and second order (Xxxxxx & Xxxxx-Xxxxx, 2001), incremental and radical (Xxxxx & Xxxxxx, 1996) transactional and transformational (Xxxxxxx, 2000) and adaptive and generative (Senge, 1990). Despite the plethora of terms, "a reasonable consensus seems to have been established that they refer to comparable learning processes and outcomes" (Xxxxx, Xxxxxx , & Xxxxxxxx, 2011 p292). From reviewing the literature, the most widely cited terms to describe these two types of learning are those coined by Xxxxxxx and Schon: single and double- loop learning (Argyris, 1977; Argyris 1976; Xxxxxxx & Xxxxx, 1974). Argyris (1976) uses the analogy of a loop to emphasise that organisational learning is a continuous process which happens many times rather than a one-off occurrence. In the years since Xxxxxxx and Schon posited their theory of single and double-loop learning, other authors have added additional loops with theories of triple-loop learning now in existence. In this section, I describe these looped learning theories to build a theoretical framework of organisational learning for my research study. Single-Loop Learning In single-loop learning, the organisation identifies a problem and implements solutions to address it in line with current processes and procedures and without questioning the underlying system (Argyris, 1977). Argyris uses the analogy of a thermostat to explain this: if the temperature gets too cold, the thermostat senses this and turns the heating on. The thermostat detects the error – i.e. we are not at the optimum temperature – so makes an adjustment to correct the situation. Argyris (1977) calls this single-loop learning because the thermostat is able to make an adjustment to change the situation in line with its usual mode of operation. In a museum context, this is like the situation of the number of schools booking onto a workshop falling prompting the museum to update the content and experience of the workshop to make it more relevant and engaging or even creating a new workshop based on a more popular topic. This is s...
AutoNDA by SimpleDocs

Related to Looped Learning

  • E-LEARNING a) E-Learning is defined as a method of credit course delivery that relies on communication between students and teachers through the internet or any other digital platform and does not require students to be face-to-face with each other or with their teacher. Online learning shall have the same meaning as E-Learning.

  • Distance Learning Distance learning is a teaching modality whereby all or the majority of instruction and student interaction occurs via electronic media or equivalent mechanisms with the Faculty and students physically separated from each other. This includes courses that are fully online as well as Live online, hybrid, flipped, computer-based courses, and other alternate delivery methods.

  • TEACHING AND LEARNING This component captures institutional strengths in program delivery methods that expand learning options for students, and improve their learning experience and career preparedness. This may include, but is not limited to, experiential learning, online learning, entrepreneurial learning, work integrated learning, and international exchange opportunities.

  • Name Collision Occurrence Management 6.1. No-­‐Activation Period. Registry Operator shall not activate any names in the DNS zone for the Registry TLD (except for "NIC") until at least 120 calendar days after the effective date of this agreement. Registry Operator may allocate names (subject to subsection 6.2 below) during this period only if Registry Operator causes registrants to be clearly informed of the inability to activate names until the No-­‐Activation Period ends.

  • Business Continuity and Disaster Recovery Bank shall maintain and update from time to time business continuation and disaster recovery procedures with respect to its global custody business, which are designed, in the event of a significant business disruption affecting Bank, to be sufficient to enable Bank to resume and continue to perform its duties and obligations under this Agreement without undue delay or disruption. Bank shall test the operability of such procedures at least annually. Bank shall enter into and shall maintain in effect at all times during the term of this Agreement reasonable provision for (i) periodic back-up of the computer files and data with respect to Customer and (ii) use of alternative electronic data processing equipment to provide services under this Agreement. Upon reasonable request, Bank shall discuss with Customer any business continuation and disaster recovery procedures of Bank. Bank represents that its business continuation and disaster recovery procedures are appropriate for its business as a global custodian to investment companies registered under the 1940 Act.

  • Name Collision Occurrence Assessment 6.2.1 Registry Operator shall not activate any names in the DNS zone for the Registry TLD except in compliance with a Name Collision Occurrence Assessment provided by ICANN regarding the Registry TLD. Registry Operator will either (A) implement the mitigation measures described in its Name Collision Occurrence Assessment before activating any second-­‐level domain name, or (B) block those second-­‐level domain names for which the mitigation measures as described in the Name Collision Occurrence Assessment have not been implemented and proceed with activating names that are not listed in the Assessment.

  • Professional Learning A. School-based Professional Learning

  • Archival Back-Up and Disaster Recovery Licensee may use and copy the Product and related Documentation in connection with: i) reproducing a reasonable number of copies of the Product for archival backup and disaster recovery procedures in the event of destruction or corruption of the Product or disasters or emergencies which require Licensee to restore backup(s) or to initiate disaster recovery procedures for its platform or operating systems; ii) reproducing a reasonable number of copies of the Product and related Documentation for cold site storage. “Cold Site” storage shall be defined as a restorable back-up copy of the Product not to be installed until and after the declaration by the Licensee of a disaster; iii) reproducing a back-up copy of the Product to run for a reasonable period of time in conjunction with a documented consolidation or transfer otherwise allowed herein. “Disaster Recovery” shall be defined as the installation and storage of Product in ready-to-execute, back-up computer systems prior to disaster or breakdown which is not used for active production or development.

  • Independence from Material Breach Determination Except as set forth in Section X.D.1.c, these provisions for payment of Stipulated Penalties shall not affect or otherwise set a standard for OIG’s decision that CHSI has materially breached this CIA, which decision shall be made at OIG’s discretion and shall be governed by the provisions in Section X.D, below.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

Time is Money Join Law Insider Premium to draft better contracts faster.