Jump to content

MESSAGE in its epistemic environment

From glossaLAB
Charles François (2004). MESSAGE in its epistemic environment, International Encyclopedia of Systems and Cybernetics, 2(1): 2082.
Collection International Encyclopedia of Systems and Cybernetics
Year 2004
Vol. (num.) 2(1)
ID 2082
Object type Epistemology, ontology or semantics

Electronic and human messages are different as the first ones are technically based and the latter ones are semantically based, after of course being transmitted through a physical medium.

As explained by L. THAYER: “… in electronic communication… the transmitter has been designed and programmed to send and the receiver has been designed and programmed to receive (and sometimes to process in some way)” (1972, p.101).

Ambiguity in coding is proscribed and redundancy is used to eliminate noise as completely as possible: “… the ”message“ must be invariant for the transmitter and the receiver under all conditions. This is the whole point of reliable communication” (Ibid).

THAYER pursues: “For humans, on the other hand, the ”message“ (which itself is a misnomer) must vary with the context” (Ibid). This means that the same message in different circumstances or places may be received and interpreted in quite different fashion by different receivers. The significance may heavily depend on what B. HOLZNER (quoted by THAYER) calls the “epistemic community” in which it is emitted and received.

THAYER adds the important following comment: “Closely related is the conceptual confusion that has resulted from analogizing the concept of ”information“ from electronic communication theory, information theory, and cybernetics into the study of human communication” (Ibid).

This kind of “electronic reductionism” goes a long way to explain psychologists and sociologists resistance to the cybernetic concepts in general, and even their belief that cybernetics is not much more than manipulative gadgetry.

This website only uses its own cookies for technical purposes; it does not collect or transfer users' personal data without their knowledge. However, it contains links to third-party websites with third-party privacy policies, which you can accept or reject when you access them.