{"id":23,"date":"2019-08-26T14:01:17","date_gmt":"2019-08-26T18:01:17","guid":{"rendered":"https:\/\/scholarblogs.emory.edu\/vulnerability\/?p=23"},"modified":"2019-08-26T14:06:38","modified_gmt":"2019-08-26T18:06:38","slug":"understanding-vulnerability-theory","status":"publish","type":"post","link":"https:\/\/scholarblogs.emory.edu\/vulnerability\/2019\/08\/26\/understanding-vulnerability-theory\/","title":{"rendered":"Understanding Vulnerability Theory"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">by Martha A. Fineman<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"388\" src=\"https:\/\/scholarblogs.emory.edu\/vulnerability\/files\/2019\/08\/puzzle-3223941_640.jpg\" alt=\"\" class=\"wp-image-25\" \/><figcaption><em>Image by <\/em><a href=\"https:\/\/pixabay.com\/users\/alexas_fotos-686414\/\"><em>Alexas_Fotos<\/em><\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>&#8220;Western systems of law and justice have inherited a political  liberalism that imagines a \u2018liberal legal subject\u2019 as the ideal citizen \u2013  this subject is an autonomous, independent and fully-functioning adult,  who inhabits a world defined by individual, not societal  responsibility, where state intervention or regulation is perceived as a  violation of his liberty. Social arrangements and institutions with  significant effects on everyone lives, such as the family<em>, <\/em>are  deemed \u201cprivate\u201d and their operation and functioning relegated to  ideologies of meritocracy and the free market.&nbsp; &nbsp;Vulnerability theory  challenges the dominance of this static and individualized legal  subject, and argues for the recognition of actual human lives as  socially and materially dynamic.<\/p>\n\n\n\n<p>Vulnerability theory understands human beings as embodied creatures \nwho are inexorably embedded in social relationships and institutions. By\n rejecting the limited subjectivity constructed in the liberal \nimagination, we acknowledge the lived complexity of the \u2018vulnerable \nlegal subject\u2019 \u2013 a political vision of how the human condition is \nprofoundly shaped by an inherent and constant state of vulnerability \nacross the life-course from birth until death. Incorporating the \ninevitability of change into the political project of conceiving the \nlegal subject creates a complex subjectivity to guide the way we define \nindividual and state responsibilities. It provides a basis to question \nand critique current allocations of responsibility for individual and \nsocietal wellbeing across the individual and the state and its \ninstitutions. Vulnerability theory takes seriously the political and \nlegal implications of the fact that we live within a fragile \nmateriality. We are, all of us, vulnerable. Sometimes our vulnerability \nis realized in the form of dependency on others for care, cooperation, \nor assistance.&nbsp; Sometimes it is realized in our dependency on social \narrangements, such as the family or the market or economy.&nbsp; But, whether\n realized or latent, this vulnerability is universal and constant \u2013 an \nessential and inexorable aspect of the human condition.<\/p>\n\n\n\n<p>Importantly, the primary emphasis of vulnerability theory is not our  human vulnerability, although the theory begins there. When  vulnerability is understood as a universal constant, the task then  becomes to explore the strategies by which we can mitigate this  vulnerability. Therefore, human beings are not rendered more or less  vulnerable because they have certain characteristics or are at various  stages in their lives, but do experience the world with differing levels  of <em>resilience<\/em>. The inequality of resilience is at the heart of  vulnerability theory because it turns our attention to society and  social institutions. No one is born resilient. Rather, resilience is  produced within and through institutions and relationships that confer  privilege and power. Those institutions and relationships, whether  deemed public or private, are at least partially defined and reinforced  by law.&#8221;<\/p>\n\n\n\n<p><em>See original post here: <\/em><a href=\"http:\/\/newlegalrealism.org\/2015\/11\/30\/fineman-on-vulnerability-and-law\/\">http:\/\/newlegalrealism.org\/2015\/11\/30\/fineman-on-vulnerability-and-law\/<\/a><\/p>\n\n\n\n<p>Questions: <\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>How do laws reinforce and define institutions and relationships?<\/li><li>What are some ways that the state can adjust for vulnerability?<\/li><li>How does a vulnerability analysis shift state responsibility?<\/li><\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Martha A. Fineman &#8220;Western systems of law and justice have inherited a political liberalism that imagines a \u2018liberal legal subject\u2019 as the ideal citizen \u2013 this subject is an autonomous, independent and fully-functioning adult, who inhabits a world defined by individual, not societal responsibility, where state intervention or regulation is perceived as a violation &hellip; <a href=\"https:\/\/scholarblogs.emory.edu\/vulnerability\/2019\/08\/26\/understanding-vulnerability-theory\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Understanding Vulnerability Theory<\/span><\/a><\/p>\n","protected":false},"author":6159,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-23","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/posts\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/users\/6159"}],"replies":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":8,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/posts\/23\/revisions"}],"predecessor-version":[{"id":35,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/posts\/23\/revisions\/35"}],"wp:attachment":[{"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/media?parent=23"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/categories?post=23"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/tags?post=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}