{"id":1275,"date":"2013-07-19T07:02:24","date_gmt":"2013-07-19T07:02:24","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2013\/?page_id=1275"},"modified":"2013-07-19T07:02:24","modified_gmt":"2013-07-19T07:02:24","slug":"peter-bednars-paper-proposal","status":"publish","type":"page","link":"https:\/\/asc-cybernetics.org\/2013\/?page_id=1275","title":{"rendered":"Peter Bednar&#8217;s Paper Proposal"},"content":{"rendered":"<p><center><\/p>\n<h3>Contextual Inquiry and Socio-Technical Practice<\/h3>\n<p><\/center><br \/>\n<center><strong>Co-author(s): Christine Welch<\/strong><\/center><br \/>\n<i>When Change Magicians (or business analysts) engage a business organization they enter a environment where professionals are already acting in the context of their business and work. The problem spaces engaged in are often seen as both complex and uncertain. When those same professionals are not only continuing to work as knowledgeworkers in their ordinary jobs but also engage in a pursuit of purposeful and desireable change activity they are making an effort to create and sustain an ongoing double helix of action and reflection. A change magician involved has a role of facilitator who is supporting the organizational actors in their efforts to create and sustain this double helix process so it becomes a natural part of their ongoing practices. For many organizations big as well as small, the use of a Socio-Technical Toolbox can come in handy as it both can be easily understood from a pragmatic perspective as well as it supports reflection in ways which are not normally discussed or questioned.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Contextual Inquiry and Socio-Technical Practice Co-author(s): Christine Welch When Change Magicians (or business analysts) engage a business organization they enter a environment where professionals are already acting in the context of their business and work. The problem spaces engaged in are often seen as both complex and uncertain. When those same professionals are not only &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/asc-cybernetics.org\/2013\/?page_id=1275\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":113,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"participants_only.php","meta":{"footnotes":""},"class_list":["post-1275","page","type-page","status-publish","hentry","nodate","item-wrap"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/1275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1275"}],"version-history":[{"count":1,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/1275\/revisions"}],"predecessor-version":[{"id":1276,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/1275\/revisions\/1276"}],"up":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/113"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}