Learning from Moral Failure

2020 ◽  
pp. 182-195
Author(s):  
Matthew Cashman ◽  
Fiery Cushman

Pedagogical environments are often designed to minimize the chance of people acting wrongly; surely this is a sensible approach. But could it ever be useful to design pedagogical environments to permit, or even encourage, moral failure? If so, what are the circumstances where moral failure can be beneficial? What types of moral failure are helpful for learning, and by what mechanisms? This chapter considers the possibility that moral failure can be an especially effective tool in fostering learning. It also considers the obvious costs and potential risks of allowing or fostering moral failure. It concludes by suggesting research directions that would help to establish whether, when, and how moral pedagogy might be facilitated by letting students learn from moral failure.

Author(s):  
Ahm Shamsuzzoha

Global business communities are facing tremendous challenges from market places with respect to reduce cost and offer true customized products or services to the end customers. To cope such challenges companies are nowadays considering forming a business network with the objective to achieve several business benefits. However, to execute such business network is not risks free but always facing some problems for its continuation successfully. In such situation, it is necessary to formulate risk mitigation plan and strengthen the resilience within business network. The objective of this article is therefore to identifying and sharing risks within the collaborative business network and proposing necessary mitigating plan and resilience for it. In this research, a framework is also highlighted that provides a structural approach for identifying and assessing potential risks and resilience in business networks and their possible impacts on different levels of collaboration. The study is concluded with future research directions.


2011 ◽  
Vol 186 ◽  
pp. 596-600 ◽  
Author(s):  
Ji Yi Wu ◽  
Qian Li Shen ◽  
Jian Lin Zhang ◽  
Qi Xie

Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions in the field were pointed out. It’s will be a new trend for the cloud computing and trusted computing technology to integrate..


2018 ◽  
pp. 1591-1605
Author(s):  
Ahm Shamsuzzoha

Global business communities are facing tremendous challenges from market places with respect to reduce cost and offer true customized products or services to the end customers. To cope such challenges companies are nowadays considering forming a business network with the objective to achieve several business benefits. However, to execute such business network is not risks free but always facing some problems for its continuation successfully. In such situation, it is necessary to formulate risk mitigation plan and strengthen the resilience within business network. The objective of this article is therefore to identifying and sharing risks within the collaborative business network and proposing necessary mitigating plan and resilience for it. In this research, a framework is also highlighted that provides a structural approach for identifying and assessing potential risks and resilience in business networks and their possible impacts on different levels of collaboration. The study is concluded with future research directions.


Author(s):  
Jesse L. Reynolds

Solar climate engineering—intentional modification of the planet’s reflectivity—is coming under increasing consideration as a means to counter climate change. At present, it offers the possibility of greatly reducing climate risks, but would pose physical and social risks of its own. This chapter offers an introduction to solar climate engineering, and explores its potential, risks, and legal and regulatory challenges. It also contextualizes these proposals with respect to other emerging technologies and the broader socio-political milieu. The chapter discusses the contours of existing and potential regulation, particularly at the international level. These aspects include regulatory rationales, diverse characteristics of proposed regulatory regimes, difficulties in defining the regulatory target, and the management of uncertainty through precaution. The chapter closes with suggested future research directions in the law and regulation of solar climate engineering.


2019 ◽  
Vol 9 (7) ◽  
pp. 1365 ◽  
Author(s):  
Xue Yang ◽  
Shiqiu Zhang ◽  
Meiting Ju ◽  
Le Liu

As a new functional material, biochar was usually prepared from biomass and solid wastes such as agricultural and forestry waste, sludge, livestock, and poultry manure. The wide application of biochar is due to its abilities to remove pollutants, remediate contaminated soil, and reduce greenhouse gas emissions. In this paper, the influence of preparation methods, process parameters, and modification methods on the physicochemical properties of biochar were discussed, as well as the mechanisms of biochar in the remediation of soil pollution. The biochar applications in soil remediation in the past years were summarized, such as the removal of heavy metals and persistent organic pollutants (POPs), and the improvement of soil quality. Finally, the potential risks of biochar application and the future research directions were analyzed.


Author(s):  
Julian Jang Jaccard

Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.   


Author(s):  
Julian Jang Jaccard

Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.   


2014 ◽  
Vol 21 (1) ◽  
pp. 15-23 ◽  
Author(s):  
Helen Pryce ◽  
Amanda Hall

Shared decision-making (SDM), a component of patient-centered care, is the process in which the clinician and patient both participate in decision-making about treatment; information is shared between the parties and both agree with the decision. Shared decision-making is appropriate for health care conditions in which there is more than one evidence-based treatment or management option that have different benefits and risks. The patient's involvement ensures that the decisions regarding treatment are sensitive to the patient's values and preferences. Audiologic rehabilitation requires substantial behavior changes on the part of patients and includes benefits to their communication as well as compromises and potential risks. This article identifies the importance of shared decision-making in audiologic rehabilitation and the changes required to implement it effectively.


Sign in / Sign up

Export Citation Format

Share Document