Access the full text.
Sign up today, get DeepDyve free for 14 days.
(1995)
The Managerial Cybernetics of Organisation: Brain of the Firm
A. McKinstry-Wu, M. Kelz (2013)
Connectome: How the Brain’s Wiring Makes Us Who We AreAnesthesia & Analgesia, 117
H. Foerster (2002)
Understanding Understanding
T. Tetenbaum, H. Laurence
Governing in the chaos of the 21st century
P. Burke, J. Tully (1977)
The Measurement of Role IdentitySocial Forces, 55
(1957)
An Introduction to Cybernetics, 2nd ed
IBM
Capitalizing on Complexity: Insights from the Global Chief Executive Officer Study
P. Stokes (2006)
Identity: articulating cybernetics and sociologyKybernetes, 35
Russ Marion, Mary Uhl‐Bien (2001)
Leadership in complex organizationsLeadership Quarterly, 12
Mary Uhl‐Bien, Russ Marion, B. McKelvey (2007)
Complexity Leadership Theory: Shifting leadership from the industrial age to the knowledge era !, 18
V. Foerster
Understanding Understanding: Essays on Cybernetics and Cognition
Yves Laberge (2007)
The Tree of Knowledge: The Biological Roots of Human UnderstandingComplicity: An International Journal of Complexity in Education, 4
Toby Tetenbaum, H. Laurence (2011)
Leading in the chaos of the 21st centuryJournal of Leadership Studies, 4
W. Ashby (1957)
An Introduction to CyberneticsThe Mathematical Gazette, 41
P. Burke (1991)
IDENTITY PROCESSES AND SOCIAL STRESSAmerican Sociological Review, 56
E. Schrödinger, R. Penrose (1992)
THE ARITHMETICAL PARADOX: THE ONENESS OF MIND
E. Schrödinger
What is Life? The Physical Aspect of the Living Cell
Jan Stets, P. Burke (2005)
New Directions in Identity Control Theory, 22
Purpose – Research was conducted in order to identify behaviours that improve a system viability in a complex, chaotic and volatile world. The purpose of this paper is to explain why complex cybernetic systems must be authentic over time in order to maximise their viability in a complex, chaotic and volatile world. Design/methodology/approach – In total, eight faculty staff from the Thunderbird School of Global Management were interviewed around the subject of “being a successful 21st century leader”. These interviews were analysed using Ricoeur's hermeneutic methodology which resulted in three behaviours being identified: be authentic, open and transparent; these behaviours were then deep interpreted according to Ricoeur's methodology using cybernetic principles. This is an innovative piece of research that brings together phenomenology, cybernetics and leadership studies but it is also limited by being a new approach. Findings – Complex cybernetic systems must be authentic because authentic behaviour nurtures the system's identity and ensures that it is able to consistently generate a clear goal signal. It is also proposed that authenticity is important for coping with the “law of variety” by acting as an amplification mechanism. Research limitations/implications – The research implication is that it is possible to identify behaviours to improve the viability of all complex cybernetic systems. Originality/value – The work is highly original because it provides a cybernetic explanation for why authentic behaviour is necessary. As far as the author is aware, no work has yet combined cybernetics with leadership behaviours and provided a cogent explanation for why authenticity is so important for system viability. The value of this work is that it clearly shows the value of authentic behaviour by showing how and why authentic behaviour improves system viability and how inauthentic behaviour harms system viability.
Kybernetes – Emerald Publishing
Published: Apr 19, 2013
Keywords: Behaviour; Leadership; Cybernetics; Complex systems; Authenticity; Identity; Negentropy; Twenty‐first century leadership; Regulate
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.