{"id":28,"date":"2015-11-23T01:07:25","date_gmt":"2015-11-23T01:07:25","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2016\/?page_id=28"},"modified":"2016-02-16T07:42:22","modified_gmt":"2016-02-16T07:42:22","slug":"publications","status":"publish","type":"page","link":"https:\/\/asc-cybernetics.org\/2016\/publications\/","title":{"rendered":"Reviewing"},"content":{"rendered":"<p>Those who are interested in publishing their conference contributions academically will have the opportunity to submit full papers to one or more special issues of high quality cybernetics-related journal(s) after the event. This will be based in a two-step reviewing process: In the first instance, 2-page abstracts will be reviewed before the conference. Accepted poster or seminar presentations are expected to develop through participation in the conference \u2013 in particular through \u201ccybernetic fairs\u201d at the beginning and at the end of the event. After the conference, full papers submitted on the basis of seminar and poster presentations undergo a second peer review process in order to be accepted for journal publication.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Those who are interested in publishing their conference contributions academically will have the opportunity to submit full papers to one or more special issues of high quality cybernetics-related journal(s) after the event. This will be based in a two-step reviewing process: In the first instance, 2-page abstracts will be reviewed before the conference. Accepted poster<a class=\"read-more \" href=\"https:\/\/asc-cybernetics.org\/2016\/publications\/\" title=\"Read More\"> <span class=\"button default\">Read More<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":300,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":3,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":113,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages\/28\/revisions\/113"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}