{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:57:33Z","timestamp":1754157453723,"version":"3.41.2"},"reference-count":55,"publisher":"Emerald","issue":"1\/2","license":[{"start":{"date-parts":[[2009,2,13]],"date-time":"2009-02-13T00:00:00Z","timestamp":1234483200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,2,13]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to suggest a more holistic definition and basic guidelines for implementation of specific cybernetics dealing with business systems (BSs) from the viewpoint of managing them. The paper aims to consider three problems: how to develop a general methodology of requisitely holistic thinking for business cybernetics (BC) and its application; how to consider the attributes of BC (e.g. all attributes of BC and their generalization in BSs); and how to recognize and define relations between attributes of BC and their synergies.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>In this paper, qualitative analysis on the basis of the cybernetics (e.g. especially general cybernetics), BC (different) systems theories, and dialectical systems theory is applied.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>BC is shown to be a specific cybernetic dealing with BSs from viewpoint of managing\/impacting on them. Thus, BC is trying to complete previous cognitions about possible approaches for managing\/impacting on BSs. It covers the basic, information, and managerial processes, their interdependences, the resulting interaction and synergies. In addition, BC is also trying to make room for consideration of the general, group\u2010specific, and individual parts of attributes of BSs. BC itself is based on the concept of the Dialectical Systems Theory that the law of requisite holism is met by dialectical system which creates synergetic networks of all essential kinds of cybernetics.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>Research is limited to three hypotheses and qualitative analysis in desk research. Practical experience is considered implicitly.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Authors falsifying the practice of prevailing general approach to researching and understanding of management in BSs (as an area of human activity with specific characteristics) from cybernetics viewpoint. This paper suggests a more specifically created and target\u2010oriented approach for cybernetic understanding and researching of BSs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The available literature does not provide for a similar concept and\/or model of specific cybernetics dealing with BSs from the viewpoint of managing BSs or their impact.<\/jats:p><\/jats:sec>","DOI":"10.1108\/03684920910930295","type":"journal-article","created":{"date-parts":[[2009,2,22]],"date-time":"2009-02-22T00:40:14Z","timestamp":1235263214000},"page":"93-112","source":"Crossref","is-referenced-by-count":6,"title":["Business cybernetics \u2013 provocation number two"],"prefix":"10.1108","volume":"38","author":[{"given":"Vojko","family":"Potocan","sequence":"first","affiliation":[]},{"given":"Matjaz","family":"Mulej","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010620392304800_b1","unstructured":"Afuah, A. (2003), Business Models: A Strategic Management Approach, McGraw\u2010Hill, New York, NY."},{"key":"key2021010620392304800_b2","doi-asserted-by":"crossref","unstructured":"Agrell, P. and Vall\u00e9e, R. (1985), \u201cDifferent concepts of system analysis\u201d, Kybernetes, Vol. 14 No. 2, pp. 81\u20105.","DOI":"10.1108\/eb005706"},{"key":"key2021010620392304800_b3","doi-asserted-by":"crossref","unstructured":"Ashby, W. (1956), An Introduction to Cybernetics, Chapman and Hall, London.","DOI":"10.5962\/bhl.title.5851"},{"key":"key2021010620392304800_b4","unstructured":"Beer, S. (1959), Cybernetics and Management, English University Press, London."},{"key":"key2021010620392304800_b5","unstructured":"Beer, S. (1972), Brain of the Firm, Allen Lane, London."},{"key":"key2021010620392304800_b6","unstructured":"Beer, S. (1979), The Heart of Enterprises, Wiley, London."},{"key":"key2021010620392304800_b7","unstructured":"Beer, S. (1985), Diagnosing the System for Organizations, Wiley, London."},{"key":"key2021010620392304800_b8","unstructured":"Bertalanffy, L. (1968), General Systems Theory, Foundations, Development, Applications, Brazillier, New York, NY."},{"key":"key2021010620392304800_b9","unstructured":"Diebner, H. et al., (2002), \u201cToward a second cybernetics model for cognitive systems\u201d, Chaos, Solitons & Fractals, Vol. 13 No. 7, pp. 1465\u201074."},{"key":"key2021010620392304800_b11","unstructured":"Foerster, H. (1974), BCL Report 73.38: Cybernetics of Cybernetics, University of Illinois, Urbana, IL."},{"key":"key2021010620392304800_b12","unstructured":"Foerster, H. (1987), \u201cCybernetics\u201d, in Encyclopedia for Artificial Intelligence, Wiley, New York, NY."},{"key":"key2021010620392304800_b10","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois, C. (Ed.) (2004), International Encyclopedia of Systems and Cybernetics, K.G. Saur, Munchen.","DOI":"10.1515\/9783110968019"},{"key":"key2021010620392304800_b13","unstructured":"Jackson, M. (1987), Systems Thinking: Creative Holism for Managers, Wiley, Chichester."},{"key":"key2021010620392304800_b14","doi-asserted-by":"crossref","unstructured":"Jackson, M. (1991), Systems Methodology for the Management Sciences, Plenum Press, New York, NY.","DOI":"10.1007\/978-1-4899-2632-6"},{"key":"key2021010620392304800_b15","doi-asserted-by":"crossref","unstructured":"Maturana, H. (1980), Autopoiesis and Cognition: The Realization of the Living, Ridel, Boston, MA.","DOI":"10.1007\/978-94-009-8947-4"},{"key":"key2021010620392304800_b16","unstructured":"Miller, J. (1978), Living Systems, McGraw\u2010Hill, New York, NY."},{"key":"key2021010620392304800_b17","unstructured":"Mintzberg, H. (1971), \u201cManagerial work: analysis from observation\u201d, Management Science, Vol. 18 No. 2, pp. B97\u2010B110."},{"key":"key2021010620392304800_b18","unstructured":"Mintzberg, H. (1973), The Nature of Managerial Work, Harper & Row, New York, NY."},{"key":"key2021010620392304800_b19","unstructured":"Mulej, M. (1974), Dialectical Systems Theory, FEB, Maribor."},{"key":"key2021010620392304800_b20","unstructured":"Mulej, M. (1994), \u201cThree years of support for a theory\u201d, Cybernetics and Systems, Vol. 25 No. 6, pp. 861\u201077."},{"key":"key2021010620392304800_b24","unstructured":"Mulej, M. (2007), \u201cSystems theory\u201d, Systems Research Behavior Science, Vol. 24 No. 3, pp. 347\u201057."},{"key":"key2021010620392304800_b21","unstructured":"Mulej, M. and Kajzer, S. (1998), \u201cEthics of interdependence and the law of requisite holism\u201d, in Mulej, M. (Ed.), Proceedings of STIQE, ISRM, Maribor, pp. 129\u201040."},{"key":"key2021010620392304800_b22","unstructured":"Mulej, M. et al. (2000), Basics of Systems Thinking, FEB, Maribor."},{"key":"key2021010620392304800_b23","unstructured":"Mulej, M. et al. (2004), \u201cHow to restore Bertalanffian systems thinking\u201d, Kybernetes, Vol. 33 No. 1, pp. 48\u201061."},{"key":"key2021010620392304800_b25","unstructured":"Mulej, M. et al. (2008), \u201cSystemic thinking and ethics of interdependence as the background of the power of networking\u201d, in Rebernik, M. (Ed.), Proc. of 28th PODIM, IRP, Maribor, pp. 151\u201065."},{"key":"key2021010620392304800_b26","unstructured":"Osterwalder, A., Pigneur, Y. and Tucci, C. (2005), \u201cClarifying business models: origins, present and future of the concept\u201d, Communications of the Association for Information Systems, Vol. 16, pp. 1\u201025."},{"key":"key2021010620392304800_b27","unstructured":"Pangaro (2008), Cybernetics: A Definition, available at: www.pangaro.com\/ (accessed 12 April 2008)."},{"key":"key2021010620392304800_b29","unstructured":"Potocan, V. and Mulej, M. (2004), \u201cThe holism of information in a virtual organization\u201d, The Journal of American Academy of Business, Vol. 5 Nos 1\/2, pp. 411\u20107."},{"key":"key2021010620392304800_b31","unstructured":"Potocan, V. and Mulej, M. (2006), \u201cWhat is business cybernetics?\u201d, The Journal of American Academy of Business, Vol. 9 No. 2, pp. 211\u20107."},{"key":"key2021010620392304800_b33","unstructured":"Potocan, V. and Mulej, M. (Eds) (2007), Transition Into an Innovative Enterprise, FEB, Maribor."},{"key":"key2021010620392304800_b28","unstructured":"Potocan, V., Mulej, M. and Kajzer, S. (2003), \u201cDuality, cybernetics and system(s) theory from the aspect of business cybernetics\u201d, in Christakis, A. and Bausch, K. (Eds), Proceedings of 47th ISSS Conference, ISSS, Iraklion, pp. 69\u201081."},{"key":"key2021010620392304800_b30","unstructured":"Potocan, V., Mulej, K. and Kajzer, S. (2005), \u201cBusiness cybernetics: a provocative suggestion\u201d, Kybernetes, Vol. 34 Nos 9\/10, pp. 1496\u2010516."},{"key":"key2021010620392304800_b32","unstructured":"Potocan, V. et al. (2007), \u201cBusiness cybernetics and its support to holism of information in business systems\u201d, in Chroust, G. (Ed.), IDIMT\u20102007, Trauner, Linz, pp. 243\u201056."},{"key":"key2021010620392304800_b34","unstructured":"Rooke, D. and Torbert, R. (2005), \u201c7 transformations of leadership\u201d, Harvard Business Review, pp. 67\u201076, April."},{"key":"key2021010620392304800_b35","unstructured":"Rose, J. (1967), Automation: Its Uses and Consequences, Oliver & Boyd, Edinburgh."},{"key":"key2021010620392304800_b36","unstructured":"Rose, J. (Ed.) (1969), Survey of Cybernetics: A Tribute to Dr. Norbert Wiener, Iliffe Books, London."},{"key":"key2021010620392304800_b37","unstructured":"Rose, J. (Ed.) (1970), Progress of Cybernetics, Vol. 1, Gordon and Breach, London."},{"key":"key2021010620392304800_b38","unstructured":"Rose, J. (1974), The Cybernetic Revolution, Barnes and Noble, New York, NY."},{"key":"key2021010620392304800_b39","doi-asserted-by":"crossref","unstructured":"Rose, J. (1994), \u201cThe early years: some comments on the origins and concepts of cybernetics\u201d, Kybernetes, Vol. 23 Nos 6\/7, pp. 23\u20107 (reprinted in this memorial issue pp. 20\u20105).","DOI":"10.1108\/03684929410795102"},{"key":"key2021010620392304800_b40","doi-asserted-by":"crossref","unstructured":"Rose, J. (2000), \u201cThe problem of technological barriers\u201d, Kybernetes, Vol. 29 Nos 5\/6, pp. 576\u201094 (reprinted in this memorial issue pp. 20\u20105).","DOI":"10.1108\/03684920010333062"},{"key":"key2021010620392304800_b41","unstructured":"Trappl, R. (Ed.) (1983), \u201cCybernetics: Theory and Applications\u201d, Hemisphere, Washington, DC."},{"key":"key2021010620392304800_b42","unstructured":"Trappl, R. (Ed.) (2002), \u201cCybernetics and systems 2002\u201d, Proceedings of the Sixteenth EMCSR, Austrian Society for Cybernetic Studies, University of Vienna, Vienna."},{"key":"key2021010620392304800_b43","unstructured":"Umpleby, S. (1990), \u201cThe science of cybernetics and the cybernetics of science\u201d, Cybernetics and Systems, Vol. 21 No. 1, pp. 109\u201021."},{"key":"key2021010620392304800_b44","unstructured":"Umpleby, S. (2001), \u201cWhat comes after second order cybernetics?\u201d, Cybernetics and Human Knowing, Vol. 8 No. 3, pp. 87\u20109."},{"key":"key2021010620392304800_b45","unstructured":"Umpleby, S. (2007), \u201cCybernetics\u201d, in Clegg, R. and Bailey, R. (Eds), International Encylopedia of Organization Studies, Sage, London."},{"key":"key2021010620392304800_b46","unstructured":"Umpleby, S. and Dent, E. (1999), \u201cThe origins and purposes of several traditions in systems theory and cybernetics\u201d, Cybernetics and Systems, Vol. 30 No. 2, pp. 79\u2010103."},{"key":"key2021010620392304800_b47","unstructured":"Vallee, R. (2001), \u201cTime and dynamical systems\u201d, in Zdzislaw, E. and Bubnicki, A. (Eds), Proceedings of 14th ICSS, University of Technology, Wroclaw, pp. 112\u201026."},{"key":"key2021010620392304800_b48","unstructured":"Vallee, R. (2003), History of Cybernetics (in EOLSS Encyclopedia of Life Support Systems), EOLSS, available at: www.eolss.net (accessed 15 March 2008)."},{"key":"key2021010620392304800_b49","unstructured":"Watson, D. (2005), Business Models, Harriman House, Petersfield."},{"key":"key2021010620392304800_b50","unstructured":"Wiener, N. (1948), Cybernetics or Control and Communication in the Animal and the Machine, Wiley, New York, NY."},{"key":"key2021010620392304800_b51","unstructured":"Wiener, N. (1956), The Human Use of Human Beings: Cybernetics and Society, Doubleday Anchor, New York, NY."},{"key":"key2021010620392304800_b52","unstructured":"Wiener, N. and Masani, P. (1976), Collected Works \u2013 1, MIT Press, Cambridge, MA."},{"key":"key2021010620392304800_b53","unstructured":"Wood, R. (2000), Managing Complexity: How Businesses can Adapt and Prosper in the Connected Economy, The Economist Books, London."},{"key":"key2021010620392304800_b54","unstructured":"Zadeh, L. (1965), \u201cFuzzy sets\u201d, Information and Control, Vol. 8, pp. 338\u201058."},{"key":"key2021010620392304800_b55","unstructured":"Zadeh, L. and Kacprzyk, J. (Eds) (1992), Fuzzy Logic for the Management of Uncertainty, Wiley, New York, NY."}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/03684920910930295","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684920910930295\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684920910930295\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:53:28Z","timestamp":1753401208000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/38\/1-2\/93-112\/268641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2,13]]},"references-count":55,"journal-issue":{"issue":"1\/2","published-print":{"date-parts":[[2009,2,13]]}},"alternative-id":["10.1108\/03684920910930295"],"URL":"https:\/\/doi.org\/10.1108\/03684920910930295","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2009,2,13]]}}}