‘Extimate’ Technologies: Empowerment, Intrusiveness, Surveillance: The fate of the human subject in the age of intimate technologies and Big Data

نویسنده

  • Hub Zwart
چکیده

A new chapter in the history of technology seems to be unleashed. Until recently, man-made technologies basically functioned as prostheses, as external prosthetic extensions of human bodies, directed towards the outside world, allowing us to interact with and manipulate objects more effectively, eventually transforming humans into ‘prosthesis-gods’ (Freud 1930). Currently, technological devices have begun to move inwards: entering our bodies and brains, functioning as implants rather than as extensions. Self-monitoring is an important objective of this trend. Due to recent developments in technosciences, such as synthetic biology, tissue engineering and nanomedicine, our sway over the human ‘condition’ (in its literal, biomedical sense) is increasing, down to the molecular level, and up to the point of becoming uncanny. New options for drug delivery and bio-implants are entering (pervading) human bodies and brains. On the one hand, this may be seen as strengthening human autonomy and agency. On the other hand, we must consider the possibility that we are the targets rather than the agents of this process. Rather than being in control, we may become increasingly dependent on these new technologies, emerging in the boundary zone between therapy and enhancement. On the one hand, intimate technologies allegedly open up new practices of the Self, enabling individuals to become the ‘managers’ of their own life and health. On the other hand, human beings are controlled by the gaze of the Other, which invokes a sense of unease. An exemplification is the Snyderome project. A prominent geneticist was closely monitored over the course of 14 months, measuring everything, resulting in the integrative Personal Omics Profile, a comprehensive omics portrait (“extremely high coverage”), combining “deep sequencing” with more than 3 billion measurements of molecules. This portrait is highly personal, but at the same time highly impersonal: opening up individuals to a digital panopticon: a molecularised version of the ‘voice of conscience’ in the form of a computer monitor, informing us that we must change their life on a daily basis: the superego of intimate technologies in the terabyte age. What is the fate of the human subject in the era of Big Data and intimate technologies?

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Occupational Safety and Health and Response to COVID-19 using the Fourth Industrial Revolution Technologies

Introduction: The world is currently facing an all-out crisis over the coronavirus disease 2019 (COVID-19). This review study aimed to determine the applications of the assistive intelligent technologies of the Fourth Industrial Revolution (Industry 4.0) in occupational safety and health (OSH) and response to COVID-19. Material and Methods: The given review was carried out from May to June 202...

متن کامل

The Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

متن کامل

The Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

متن کامل

Communicable Diseases Surveillance System in I.R.Iran: Strengths and Weaknesses of 30 years implementation

Background: Communicable diseases was one of the main problems in I.R.Iran. This study aimed to show the progress of communicable diseases management in more than 30 years of implementation and point out strengths and weaknesses as well. Methods: This study was carried out on an interview-based qualitative study using content analysis in 2014. Data was collected by deep interviews. Fifteen ...

متن کامل

A Study to Improve the Response in Email Campaigning by Comparing Data Mining Segmentation Approaches in Aditi Technologies

Email marketing is increasingly recognized as an effective Internet marketing tool. In this study, a questionnaire is constructed and distributed to a sample of 146 prospects of Aditi Technologies to find the factors associated with higher response rates. The collected data is analyzed using Factor Analysis and the 11 factors, From Line, Subject Line, Personalization of the subject line, Timing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017