{"id":177,"date":"2012-02-11T11:13:17","date_gmt":"2012-02-11T11:13:17","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2012\/?page_id=177"},"modified":"2012-07-11T05:37:58","modified_gmt":"2012-07-11T05:37:58","slug":"abstracts","status":"publish","type":"page","link":"https:\/\/asc-cybernetics.org\/2012\/?page_id=177","title":{"rendered":"Abstracts"},"content":{"rendered":"<p>Abstracts for plenary speeches, paper proposals, posters, <a href=\"http:\/\/asc-cybernetics.org\/2012\/?page_id=123\">workshops<\/a> and the <a href=\"http:\/\/asc-cybernetics.org\/2012\/?page_id=804\">reflexivity panel<\/a> as well as biographical statements of the <a href=\"http:\/\/asc-cybernetics.org\/2012\/?page_id=116\">invited speakers<\/a> are linked below and will be compiled in the conference booklet. The <a href=\"http:\/\/asc-cybernetics.org\/2012\/wp-content\/uploads\/2012\/07\/2012_ASC_BIG_Booklet.pdf\">conference booklet is available as a downloadable pdf file<\/a> and will also be handed out as a printed document on site.<\/p>\n<ul>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=506\">Affifi, Ramsey<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=485\">Bacigalupi, Augustus<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=116#barnes\">Barnes, Graham<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=511\">Baron, Philip<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=518\">Barrera, Ricardo and Fr\u00edas, Ricardo<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=769\">Bateson, Eric Vatikiotis<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=116#nbateson\">Bateson, Nora<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=522\">Bellafiore, Alessandro<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=530\">Cabral Filho, Jos\u00e9 dos Santos<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=534\">Campbell, Colin<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=539\">Chaney, Anthony<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=544\">Clarke, Bruce<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=547\">Collings, Art<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=550\">D\u00e1vila, Ximena<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=559\">Deacon, Terrence<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=569\">Dorsey, Ely<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=577\">Fischer, Thomas<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=581\">Forsythe, Kathleen<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=585\">Gaggero, Sebastian<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=804#rg\">Glanville, Ranulph<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=631\">Griffiths, Dai<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=635\">Gutierrez-Prieto, Hernando<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=640\">Hammond, Debora<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=645\">Harries-Jones, Peter<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=650\">Herr, Christiane<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=657\">Hieronymi, Andreas<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=661\">Ison, Ray<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=667\">Jachna, Timothy<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=672\">Jher<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=871\">Johnson, Mark and Paul Hollins<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=573\">Kadri, Faisal<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=804#lk\">Kaufmman, Louis<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=676\">King, Katie<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=681\">Krippendorff, Klaus<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=688\">Lautenschlaeger, Graziele<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=804#vl\">Lefebvre, Vladimir<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=692\">Lent, Jeremy<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=701\">Lombardi, Judith<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=705\">MacGill, Victor<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=709\">Mahrenholz, Simone<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=713\">Maturana, Humberto<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=717\">Mohr, August<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=126#nachmanovitch\">Nachmanovitch, Stephen<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=721\">Nizami, Lance<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=733\">Porto, Elioa<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=737\">Ramage, Magnus<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=741\">Rigter, Wilf<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=745\">Rosenberg, Daniel<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=750\">Rueff, Maria do C\u00e9u<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=821\">Sherman, Jeremy<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=759\">Slaymaker, Kate<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=804#fs\">Steier, Frederick<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=754\">TaekRyoo, Gi<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=804#su\">Umpleby, Stuart<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=765\">Vandresen, Monique<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=776\">Varey, Will<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=781\">Vieira de Carvalho, M\u00e1rio<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=785\">Vinston, Justin<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=789\">Wedge, Marilyn<\/a><\/li>\n<li><a href=\"http:\/\/www.asc-cybernetics.org\/2012\/?page_id=793\">Weyler, Rex<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Abstracts for plenary speeches, paper proposals, posters, workshops and the reflexivity panel as well as biographical statements of the invited speakers are linked below and will be compiled in the conference booklet. The conference booklet is available as a downloadable &hellip; <a href=\"https:\/\/asc-cybernetics.org\/2012\/?page_id=177\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":28,"menu_order":520,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-177","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages\/177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=177"}],"version-history":[{"count":22,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages\/177\/revisions"}],"predecessor-version":[{"id":955,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages\/177\/revisions\/955"}],"up":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages\/28"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}