Judith Butler's Vulnerability In Resistance

898 Words4 Pages

Before preceding to introduce my arguments in this methodological essay, it is essential to answer a simple question, i.e., what triggered me to write it? My plain answer is curiosity. A curiosity to seek answer to so many questions that are hovering over my head. Including: How do you capture the imagination of young refugee, more specifically the imagination of unaccompanied refugee minors? How do you do it that when young refugees are actually going through major uncertainties in their lives? Could photo illustration (PI) be a way of opening-up their worlds? Could it be a source of my data yielding process? Could it be my breakthrough in order to answer the question that has been following me throughout the research process – how do you …show more content…

Having explained the reasons that drove me to write it and the use of (PI) from the literature, I now move to explain the theoretical insights. Then, to the theoretical insights that drop me to this this research which is the works of Judith Butler – “Vulnerability in Resistance”. I will explain on how this theoretical underpinnings could be essential in congruent with using (PI) as a research techniques in capturing the imagination and informal agency of UME.

Judith Butler’s work on “Vulnerability in Resistance” is original and groundbreaking. In her postulation, Butler laments on how vulnerability is a source of agency. She basically illuminates the existing quagmire whether the victim stays in the state of victimhood. She negates the later that the victim or the vulnerability subject or body goes beyond victims into the process of agency. My rationale of backing the (PI) is to make the exact point. The point that by allowing young people to take photos with their cameras or cell-phones is to allow them to explain and change the world as they see it, would like to see it and how they would like to change it. In my view, photos illustration the perfect research technique to operationalize theoretical underpinning like vulnerability and