{"id":1044,"date":"2013-07-03T08:47:40","date_gmt":"2013-07-03T08:47:40","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2013\/?page_id=1044"},"modified":"2013-07-03T08:47:40","modified_gmt":"2013-07-03T08:47:40","slug":"karl-h-mllers-expression-of-interest","status":"publish","type":"page","link":"https:\/\/asc-cybernetics.org\/2013\/?page_id=1044","title":{"rendered":"Karl H. M&uuml;ller&#8217;s Expression of Interest"},"content":{"rendered":"<p>The main interest lies in three domains.<br \/>\nFirst, there is a vivid historical interest in the early texts of second-order cybenrnbetics and in the differences and similarities between authors like Heinz von Foerster, Gregory Bateson or Gordon Pask.<br \/>\nThe second area of interest lies in the production of a toolbox with the necessary instruments for being able to operate with and in second-order cybernetics.<br \/>\nAnd the third and by far most important domain for me lies in a series of actual second-order investigations in the field of the social sciences which are able to show the comparative advantages of second-order cybernetics and the profound new insights which can be gained through it. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>The main interest lies in three domains. First, there is a vivid historical interest in the early texts of second-order cybenrnbetics and in the differences and similarities between authors like Heinz von Foerster, Gregory Bateson or Gordon Pask. The second area of interest lies in the production of a toolbox with the necessary instruments for &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/asc-cybernetics.org\/2013\/?page_id=1044\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":113,"menu_order":0,"comment_status":"open","ping_status":"open","template":"participants_only.php","meta":{"footnotes":""},"class_list":["post-1044","page","type-page","status-publish","hentry","nodate","item-wrap"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/1044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1044"}],"version-history":[{"count":1,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/1044\/revisions"}],"predecessor-version":[{"id":1045,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/1044\/revisions\/1045"}],"up":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/113"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}