{"id":1504,"date":"2013-07-27T11:36:51","date_gmt":"2013-07-27T11:36:51","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2013\/?p=1504"},"modified":"2013-07-27T11:36:51","modified_gmt":"2013-07-27T11:36:51","slug":"now-a-few-more-questions-about-fear-and-criticality","status":"publish","type":"post","link":"https:\/\/asc-cybernetics.org\/2013\/?p=1504","title":{"rendered":"Now a few more questions&#8230; about fear and criticality"},"content":{"rendered":"<p>At least one more question relating to the &#8221;nature of discussion&#8221; controversy&#8230;<\/p>\n<p>1. What is the fear that sits behind the desire to coerce a particular form of discussion?<br \/>\n2. What is the desire that causes us to wield words like &#8221;contract&#8221;?<br \/>\n3. Can a conference programme ever be considered as a &#8217;contract&#8217;? How far can you go? What about the abstract of a proposed paper? [I&#8217;d be ruined!!]<br \/>\n4. What are the bounds of critique both in cybernetics generally and in this conference?<\/p>\n<p>looking forward to a bloody good argument!<\/p>\n<p>Mark<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At least one more question relating to the &#8221;nature of discussion&#8221; controversy&#8230; 1. What is the fear that sits behind the desire to coerce a particular form of discussion? 2. What is the desire that causes us to wield words like &#8221;contract&#8221;? 3. Can a conference programme ever be considered as a &#8217;contract&#8217;? How far &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/asc-cybernetics.org\/2013\/?p=1504\">Continue reading<\/a><\/p>\n","protected":false},"author":64,"featured_media":0,"comment_status":"open","ping_status":"0","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1504","post","type-post","status-publish","format-standard","hentry","category-uncategorized","item-wrap"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/posts\/1504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1504"}],"version-history":[{"count":0,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/posts\/1504\/revisions"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}