Beyond Bounded Selves and Places: The Relational Making of Vulnerability and Security


Authors
Erinn Gilson
Skidmore College
Abstract
ABSTRACTThis essay elaborates how an imbalanced reciprocity between inhabitants of places of relative safety and places of greater precarity results from pursuing security on the basis of a reactive fear of vulnerability. It analyzes a range of features that shape the complex forms that vulnerability takes with a particular focus on how the constitution of places as rhetorically and corporeally secure or not renders different groups of people secure and/or subject to heightened exposure to harm. This analysis suggests that vulnerability is better conceived as a process than a quality, mediating between conceptions of vulnerability as a universal condition and as a highly specific empirical condition. Finally, by departing from the negative, reactive view of vulnerability that animates the supposition of the boundedness of selves and places, an alternative conception of security that neither equates it with invulnerability nor opposes it to vulnerability can be developed.
Keywords No keywords specified (fix it)
Categories (categorize this paper)
ISBN(s)
DOI 10.1080/00071773.2018.1434972
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

Our Archive


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 46,330
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

Precarious Life, Vulnerability, and the Ethics of Cohabitation.Judith Butler - 2012 - Journal of Speculative Philosophy 26 (2):134-151.

View all 10 references / Add more references

Citations of this work BETA

Empathy, Respect, and Vulnerability.Elisa Magrì - 2019 - International Journal of Philosophical Studies 27 (2):327-346.

Add more citations

Similar books and articles

Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Vulnerability and Violence: On the Poverty of the Remainder.Leonard Lawlor - 2018 - Journal of the British Society for Phenomenology 49 (3):217-228.
Justifying an Adequate Response to the Vulnerable Other.Kavanagh Chandra - 2016 - Ramon Llull Journal of Applied Ethics 7 (7):57-70.

Analytics

Added to PP index
2018-03-04

Total views
20 ( #462,370 of 2,286,097 )

Recent downloads (6 months)
6 ( #196,503 of 2,286,097 )

How can I increase my downloads?

Downloads

My notes

Sign in to use this feature