{"id":68,"date":"2015-12-22T03:18:58","date_gmt":"2015-12-22T03:18:58","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2016\/?page_id=68"},"modified":"2015-12-22T03:18:58","modified_gmt":"2015-12-22T03:18:58","slug":"proceedings","status":"publish","type":"page","link":"https:\/\/asc-cybernetics.org\/2016\/publications\/proceedings\/","title":{"rendered":"Proceedings"},"content":{"rendered":"<p>We are planning to publish papers resulting from talks and poster presentations in in one or more journals in the cybernetics field, based on a full paper reviewing process after the conference. We have already done so in the past few years, resulting in the following list of &#8220;conference post-ceedings&#8221; journal issues:<\/p>\n<li><a href=\"http:\/\/www.emeraldinsight.com\/journals.htm?issn=0368-492x&#038;volume=40&#038;issue=7\" target=\"_new\">2010 conference: Kybernetes, 2011, volume 40 issues 7\u20138<\/a><\/li>\n<li><a href=\"http:\/\/www.chkjournal.org\/index.php\/component\/webjournal\/?view=issue&#038;cid=232\" target=\"_new\">2011 conference: Cybernetics and Human Knowing, 2013, volume 20 numbers 1 and 2<\/a><\/li>\n<li><a href=\"http:\/\/www.emeraldinsight.com\/journals.htm?issn=0368-492x&#038;volume=42&#038;issue=9\" target=\"_new\">2012 conference: Kybernetes, 2013, volume 42 issues 7\u20138<\/a><\/li>\n<li><a href=\"http:\/\/www.emeraldinsight.com\/toc\/k\/43\/9%2F10\" target=\"_new\">2013 conference: Kybernetes, 2014, volume 43 issues 7\u20138<\/a><\/li>\n<li><a href=\"http:\/\/www.emeraldinsight.com\/toc\/k\/44\/8%2F9\" target=\"_new\">2014 conference: Kybernetes, 2015, volume 44 issues 8-9<\/a><\/li>\n<\/ul>\n<p>Further details will be announced here in due course.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are planning to publish papers resulting from talks and poster presentations in in one or more journals in the cybernetics field, based on a full paper reviewing process after the conference. We have already done so in the past few years, resulting in the following list of &#8220;conference post-ceedings&#8221; journal issues: 2010 conference: Kybernetes,<a class=\"read-more \" href=\"https:\/\/asc-cybernetics.org\/2016\/publications\/proceedings\/\" title=\"Read More\"> <span class=\"button default\">Read More<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":28,"menu_order":360,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-68","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages\/68","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":1,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages\/68\/revisions"}],"predecessor-version":[{"id":69,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages\/68\/revisions\/69"}],"up":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/pages\/28"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2016\/wp-json\/wp\/v2\/media?parent=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}