CODE CONSTRUCTION (In human conversation) 4)
← Back
R. GLANVILLE observes that the notion of coding is mostly "seen as what spies do, what Alan TURING showed us how to handle and crack/decipher"(1997, p. 60). He observes: "These codings are codings of literal connection and transformation in which one sequence may be represented exactly by another, which may in principle be de-coded provided the encryption key is to hand. They are in effect, tautological ".
So, this type of codes, once constructed, is invariable within the limits of its base-algorithm. However this is not so in the case of human communication. Once past the bare rules of the grammatical or syntactical use of a specific spoken language, human conversation goes to a second order codification which is progressively constructed between the conversants and is ever evolving. The general concept of interpersonal code construction was developed by Gordon PASK in his very last paper (1996, p. 350-361) wherein he derives the basic idea from H.von FOERSTER's self-organization concepts as the "Progenitor of Conversation and Interaction Theories"
GLANVILLE's essay stirs deeper into the subject. He concludes: "By involving the observer as conversationalist, by not relying on prior, agreed meaning (However could we agreed it?), by insisting that meaning is personal and is not communicated, by keeping the form of communication separate from the content, conversation provides a much more basic, much more general, much less demanding, much more cybernetic understanding of how communication can happen in the world of today"(Ibid, p. 64)
Categories
- 1) General information
- 2) Methodology or model
- 3) Epistemology, ontology and semantics
- 4) Human sciences
- 5) Discipline oriented
Publisher
Bertalanffy Center for the Study of Systems Science(2020).
To cite this page, please use the following information:
Bertalanffy Center for the Study of Systems Science (2020). Title of the entry. In Charles François (Ed.), International Encyclopedia of Systems and Cybernetics (2). Retrieved from www.systemspedia.org/[full/url]
We thank the following partners for making the open access of this volume possible: