147.2
The Vulnerable Man-Machine: Human Actors As Productive Parts in Work-Networks

Saturday, July 19, 2014: 10:45 AM
Room: F206
Oral Presentation
Annika JONSSON , Inst. for Social and Psychological Studies, Karlstad University, Karlstad, Sweden
Therese KARLSSON , Inst. for Social and Psychological Studies, Karlstad University, Karlstad, Sweden
Gerd LINDGREN , Inst. for Social and Psychological Studies, Karlstad University, Karlstad, Sweden
As parts of heterogeneous work-networks, human actors need to manage their vulnerability by finding ways of fitting neatly into the network and become reliable man-machines. They may also have to learn how to manipulate the network so that they can retain a position in it. From a posthuman- and ANT-based perspective, this presentation explores human vulnerability in a male dominated, internationally successful company. Vulnerability is understood as a consequence of various material-semiotic processes, where individuals are or are perceived as unable to perform certain tasks, relearn, commit and so on. Being or being seen as able can result in vulnerability as well, as this may propel the actor in unknown or even unwanted directions.    

Working at “Techno”, human actors help form a work-network put together for increasing productivity and, in the end, profit. They are protected by laws, policies and helmets, but in this network they necessarily remain some of the softest parts with different (dis)abilities and utilities. The analysis of ethnographic data from “Techno” suggests that technology and vulnerability is closely linked. The white collar-domain of the network results in one set of human vulnerabilities and the blue collar in, to some extent, another, but the real difference lies in the actor’s possibility to manipulate the network. Depending on your formal position, who you know, how you are categorized (in terms of age, education etc.), and how well you fit into the network, you will be able to tinker with work schedules and the ordering of new machinery or software to different degrees. Being able to manipulate the network is particularly important to some, highly vulnerable actors and their manipulation-strategies differ depending on what resources they possess and how closely they are monitored by management and co-workers.