LEADER 03539nam 2200613Ia 450 001 9910438333503321 005 20200520144314.0 010 $a1-299-40837-0 010 $a94-007-6025-6 024 7 $a10.1007/978-94-007-6025-7 035 $a(CKB)2550000001018217 035 $a(EBL)1106138 035 $a(OCoLC)828627751 035 $a(SSID)ssj0000879058 035 $a(PQKBManifestationID)11486470 035 $a(PQKBTitleCode)TC0000879058 035 $a(PQKBWorkID)10837634 035 $a(PQKB)11357183 035 $a(DE-He213)978-94-007-6025-7 035 $a(MiAaPQ)EBC1106138 035 $a(PPN)168342189 035 $a(EXLCZ)992550000001018217 100 $a20130217d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHuman being @ risk $eenhancement, technology, and the evaluation of vulnerability transformations /$fby Mark Coeckelbergh 205 $a1st ed. 2013. 210 $aDordrecht $cSpringer$d2013 215 $a1 online resource (225 p.) 225 1 $aPhilosophy of engineering and technology,$x1879-7202 ;$v12 300 $aDescription based upon print version of record. 311 $a94-007-9918-7 311 $a94-007-6024-8 320 $aIncludes bibliographical references and index. 327 $aPart I Descriptive Anthropology of Vulnerability -- Chapter 1. The Transhumanist Challenge -- Chapter 2. An Anthropology of Vulnerability -- Chapter 3. Cultures and Transformations of Vulnerability -- Part II Normative Anthropology of Vulnerability -- Chapter 4. Ethics of Vulnerability (1): Implications for ethics of technology -- Chapter 5. Ethics of Vulnerability (2): Imagining the Posthuman future -- Chapter 6. Ethics of Vulnerability (3): Vulnerability in the Information Age -- Chapter 7. Politics of Vulnerability: Freedom, Justice, and the Public/Private distinction -- Chapter 8. Normative Aesthetics of Vulnerability: The Art of Coping with Vulnerability -- Conclusion. 330 $aWhereas standard approaches to risk and vulnerability presuppose a strict separation between humans and their world, this book develops an existential-phenomenological approach according to which we are always already beings-at-risk. Moreover, it is argued that in our struggle against vulnerability, we create new vulnerabilities and thereby transform ourselves as much as we transform the world. Responding to the discussion about human enhancement and information technologies, the book then shows that this dynamic-relational approach has important implications for the evaluation of new technologies and their risks. It calls for a normative anthropology of vulnerability that does not ask which objective risks are acceptable, how we can become invulnerable, or which technologies threaten human nature, but which vulnerability transformations we want. To the extent that we can steer the growth of new technologies at all, this tragic and sometimes comic project should therefore be guided by what we want to become. 410 0$aPhilosophy of Engineering and Technology,$x1879-7210 ;$v12 606 $aPhenomenology 606 $aTechnology$xPhilosophy 615 0$aPhenomenology. 615 0$aTechnology$xPhilosophy. 676 $a303.48301 676 $a601 700 $aCoeckelbergh$b Mark$0790229 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910438333503321 996 $aHuman Being @ Risk$92503346 997 $aUNINA