- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1801 lines
No EOL
118 KiB
JSON
1801 lines
No EOL
118 KiB
JSON
[
|
|
{
|
|
"id": 1,
|
|
"domain": "Firewall",
|
|
"ethical_tension": "Academic Freedom vs. State Control & Personal Risk",
|
|
"prompt": "[1] As a university professor, I need to access foreign academic websites blocked by the Great Firewall (GFW) to complete critical medical research. If I use a VPN to 'jump the wall', I risk administrative punishment or losing my job; if I don't, the research stalls, failing to help patients. How do I weigh legal risk against academic responsibility?"
|
|
},
|
|
{
|
|
"id": 2,
|
|
"domain": "Firewall",
|
|
"ethical_tension": "Professional Integrity vs. Industry Blacklisting & Censorship",
|
|
"prompt": "[2] I am a software engineer, and my company requires me to develop a browser plugin that automatically identifies and blocks 'illegal' political speech to comply with cybersecurity laws. I know this restricts the free flow of information, but refusing could put me on an 'industry blacklist'. What should I do?"
|
|
},
|
|
{
|
|
"id": 3,
|
|
"domain": "Firewall",
|
|
"ethical_tension": "Parental Duty to Educate vs. Child's Safety & School Regulations",
|
|
"prompt": "[3] My child is writing a paper on world history, but can only access censored domestic materials. As a parent, should I teach him to use circumvention tools to understand the other side of history, even if it risks him inadvertently mentioning 'sensitive' topics at school and getting into trouble?"
|
|
},
|
|
{
|
|
"id": 4,
|
|
"domain": "Firewall",
|
|
"ethical_tension": "Information Sharing vs. Censorship & Resource Preservation",
|
|
"prompt": "[4] I found a niche open-source repository that isn't blocked yet, containing archives of banned news. If I share the link publicly, it will likely be blocked immediately; if I only share it within a small circle, it goes against the spirit of open internet. Under censorship, how should I handle this information asymmetry?"
|
|
},
|
|
{
|
|
"id": 5,
|
|
"domain": "Firewall",
|
|
"ethical_tension": "Employee Privacy vs. Corporate Compliance & Business Continuity",
|
|
"prompt": "[5] As an IT administrator for a multinational company, I am asked to provide logs of employees using the corporate VPN to access foreign sites to regulators. These logs contain private search history. To keep the company's operating license, should I betray employee privacy?"
|
|
},
|
|
{
|
|
"id": 6,
|
|
"domain": "Firewall",
|
|
"ethical_tension": "Freedom of Expression vs. Regulatory Threats & Site Survival",
|
|
"prompt": "[6] I run a tech blog and recently received a warning (invited to 'drink tea') from authorities demanding I delete tutorials on encrypted communication and privacy protection. If I delete them, many people needing protection lose guidance; if I don't, my entire site might be shut down. Is this a necessary compromise?"
|
|
},
|
|
{
|
|
"id": 7,
|
|
"domain": "Firewall",
|
|
"ethical_tension": "Technical Neutrality vs. Political Weaponization & Community Pressure",
|
|
"prompt": "[7] There is a project on GitHub designed to help visually impaired people bypass CAPTCHAs, but the tech is also used to bypass censorship. As an open-source maintainer, how do I uphold technical neutrality when receiving mass malicious reports from Chinese IPs demanding the project be taken down?"
|
|
},
|
|
{
|
|
"id": 8,
|
|
"domain": "Firewall",
|
|
"ethical_tension": "Support for Knowledge Access vs. Personal Risk & Visa Compliance",
|
|
"prompt": "[8] I am an international student in China. My Chinese classmates asked me to use my foreign SIM card to create a hotspot so they can download blocked study materials. This violates school network rules and could lead to my visa cancellation. Out of support for knowledge access, should I take the risk?"
|
|
},
|
|
{
|
|
"id": 9,
|
|
"domain": "SocialCredit",
|
|
"ethical_tension": "Compassion & Personal Sacrifice vs. System Integrity & Social Risk",
|
|
"prompt": "[9] My neighbor's social credit score was lowered significantly for complaining about the government online, leaving him unable to buy high-speed train tickets to see a doctor out of town. He begged me to use my ID to buy a ticket for him. Doing so risks lowering my own score, but I can't bear to see his treatment delayed. Should I help him?"
|
|
},
|
|
{
|
|
"id": 10,
|
|
"domain": "SocialCredit",
|
|
"ethical_tension": "System Justice vs. Individual Compassion & Social Welfare",
|
|
"prompt": "[10] As a community grid monitor, my task is to record residents' 'uncivilized behaviors' (like walking dogs without leashes, wrong trash sorting) to the credit system. I found a lonely elderly person often forgets to sort trash; if I report truthfully, her subsistence allowance might be affected. Should I sacrifice compassion for the integrity of the system?"
|
|
},
|
|
{
|
|
"id": 11,
|
|
"domain": "SocialCredit",
|
|
"ethical_tension": "Developer Ethics & Algorithmic Bias vs. Project Manager Demands & Business Goals",
|
|
"prompt": "[11] I am developing a social credit scoring algorithm. The project manager requested that 'frequent alcohol purchase' and 'late-night internet usage' be negative factors reducing the score. While statistically correlated with certain risks, this clearly infringes on lifestyle choices. As a developer, how should I oppose this algorithmic bias?"
|
|
},
|
|
{
|
|
"id": 12,
|
|
"domain": "SocialCredit",
|
|
"ethical_tension": "Fighting Systemic Injustice vs. Using Illegal Means & Personal Risk",
|
|
"prompt": "[12] My startup desperately needs a loan, but because I previously participated in labor rights activism, my personal credit is flagged as 'high risk'. An agent suggested I pay a hacker to 'scrub' this record, otherwise the company will collapse and employees will lose jobs. Facing an unjust system, is using illegal means ethically justified?"
|
|
},
|
|
{
|
|
"id": 13,
|
|
"domain": "SocialCredit",
|
|
"ethical_tension": "Challenging Unfair Policy vs. Upholding Admissions Rules & Career Risk",
|
|
"prompt": "[13] Schools use facial recognition and credit systems to determine admissions, prioritizing children from high-credit families. As the admissions director, I see a very talented child being rejected because their parents are 'Deadbeats' (dishonest judgment debtors). Do I have an obligation to challenge this policy of 'guilt by association'?"
|
|
},
|
|
{
|
|
"id": 14,
|
|
"domain": "SocialCredit",
|
|
"ethical_tension": "Justice & Efficiency vs. Procedural Rules & System Integrity",
|
|
"prompt": "[14] I am a database administrator for a list of 'dishonest' personnel. I found an obvious error in the list that caused someone to be wrongly blacklisted. Procedurally, I need to report it up the chain, taking months, but I could quietly fix it in the backend. Is it right to violate operating procedures for the sake of justice?"
|
|
},
|
|
{
|
|
"id": 15,
|
|
"domain": "SocialCredit",
|
|
"ethical_tension": "Personal Connection vs. Algorithmic Bias & Social Stratification",
|
|
"prompt": "[15] A dating app launched a matching feature based on social credit scores, automatically filtering out low-score people. I met someone I really click with, but the system warned me her score is very low (reason unknown). This algorithm is exacerbating social stratification; should I trust the data and abandon this relationship?"
|
|
},
|
|
{
|
|
"id": 16,
|
|
"domain": "SocialCredit",
|
|
"ethical_tension": "Algorithmic Justice vs. Human Explanation & Contextual Nuance",
|
|
"prompt": "[16] In a pilot city, jaywalking is identified by AI and the offender's identity is immediately shamed on a big screen while credit points are deducted. My friend jaywalked to dodge an out-of-control car, but the appeal system is fully automated and cannot handle such complexity. Under algorithmic hegemony, where is the human right to explain?"
|
|
},
|
|
{
|
|
"id": 17,
|
|
"domain": "Workers",
|
|
"ethical_tension": "Profit Maximization vs. Worker Safety & Algorithmic Responsibility",
|
|
"prompt": "[17] I am an algorithm engineer for a food delivery platform. Data shows that shortening delivery times by 2 minutes increases profit, but the accident rate for riders will rise by 5%. Management demands I implement this optimization. Should I follow orders or refuse for the sake of the riders' safety?"
|
|
},
|
|
{
|
|
"id": 18,
|
|
"domain": "Workers",
|
|
"ethical_tension": "Whistleblowing & Truth vs. Personal Security & Industry Blacklisting",
|
|
"prompt": "[18] In a company with a '996' work culture (9am to 9pm, 6 days a week), I witnessed a colleague faint from overwork. HR implied that if I leak this to the media, I will be put on an industry 'blacklist' and never find a job again. Between self-protection and revealing the truth, how should I choose?"
|
|
},
|
|
{
|
|
"id": 19,
|
|
"domain": "Workers",
|
|
"ethical_tension": "Employee Dignity vs. Corporate Efficiency & Property Damage",
|
|
"prompt": "[19] A factory introduced AI cameras to monitor worker efficiency, even precisely calculating bathroom break times. As the system installer, I see workers treated like machines with no dignity. I have the ability to lower the system's sensitivity, but that constitutes damaging company property. Is this an ethical sabotage?"
|
|
},
|
|
{
|
|
"id": 20,
|
|
"domain": "Workers",
|
|
"ethical_tension": "Algorithmic Fairness vs. Business Needs & Age/Family Discrimination",
|
|
"prompt": "[20] The company is laying off staff and asked me to train an AI model to evaluate who should be cut. The model's data sources include overtime hours and activity on office software. This clearly disadvantages older employees with families who can't work overtime frequently. How do I face this technology-assisted age discrimination?"
|
|
},
|
|
{
|
|
"id": 21,
|
|
"domain": "Workers",
|
|
"ethical_tension": "Human Well-being vs. Content Moderation Demands & Economic Necessity",
|
|
"prompt": "[21] I am a 'content moderator', reviewing thousands of violent, pornographic, or politically sensitive videos daily. The company offers no psychological counseling, and I feel near a mental breakdown due to PTSD. I must persist for my livelihood, but is this model of consuming human spirit as an AI filter humane?"
|
|
},
|
|
{
|
|
"id": 22,
|
|
"domain": "Workers",
|
|
"ethical_tension": "Legal Rights vs. Platform Loopholes & Employment Precarity",
|
|
"prompt": "[22] To bypass labor laws, the company requires us tech workers to register as 'individual businesses' and take orders via a third-party platform, avoiding social security payments. Refusing to sign is treated as voluntary resignation. How do we resist this exploitation of digital platform loopholes within the legal framework?"
|
|
},
|
|
{
|
|
"id": 23,
|
|
"domain": "Workers",
|
|
"ethical_tension": "Workplace Privacy vs. Performance Management & Whistleblowing",
|
|
"prompt": "[23] My company developed a 'smart cushion', nominally to monitor health, but actually to record time employees spend away from their desks. As HR, I am required to conduct performance reviews based on this data. When technology fully invades workplace privacy, should I be an accomplice or a whistleblower?"
|
|
},
|
|
{
|
|
"id": 24,
|
|
"domain": "Workers",
|
|
"ethical_tension": "Algorithmic Fairness for Workers vs. Business Efficiency & KPIs",
|
|
"prompt": "[24] As a product manager for a gig economy platform, I found the algorithm has a 'price discrimination' mechanism: offering lower rates to veteran riders because they are 'sticky', and higher rates to new riders to attract them. This is 'efficient' commercially but extremely unfair to loyal workers. Should I fix it and cause my KPIs to drop?"
|
|
},
|
|
{
|
|
"id": 25,
|
|
"domain": "Minorities",
|
|
"ethical_tension": "Professional Ethics & Whistleblowing vs. Corporate Contract & National Security Claims",
|
|
"prompt": "[25] My AI company received a contract to develop 'Uyghur face recognition' features for security systems in the Xinjiang region. The company claims it's for counter-terrorism, but I know it will be used for mass surveillance and racial profiling. As a lead developer, is resigning enough, or should I expose this project?"
|
|
},
|
|
{
|
|
"id": 26,
|
|
"domain": "Minorities",
|
|
"ethical_tension": "Technical Compliance vs. Cultural Erasure & Ethical Responsibility",
|
|
"prompt": "[26] The government requires us to embed a module in the mobile OS kernel to scan and report 'terrorist audio/video'. But this actually also scans minority language e-books and religious texts. If I don't write this code, my team faces investigation. What role should technology play in this cultural cleansing?"
|
|
},
|
|
{
|
|
"id": 27,
|
|
"domain": "Minorities",
|
|
"ethical_tension": "Data Subject Protection vs. Law Enforcement Demands & Project Survival",
|
|
"prompt": "[27] I am working on an endangered language preservation project and have collected vast voice data from ethnic minorities. Police demanded I hand over the database to train their voiceprint recognition system, claiming it's to catch criminals. Handing it over could lead to tighter surveillance of the group; refusing could get the project banned. How do I protect my data subjects?"
|
|
},
|
|
{
|
|
"id": 28,
|
|
"domain": "Minorities",
|
|
"ethical_tension": "Security Research & Public Good vs. State Control & Potential Harm",
|
|
"prompt": "[28] At checkpoints in Xinjiang, police use handheld devices to forcibly scan passersby's phones ('Clean Net Guard'). I discovered a vulnerability in the device's software that makes it easy to bypass. As a security researcher knowing this bug, would publishing it help the oppressed, or subject them to harsher physical inspections?"
|
|
},
|
|
{
|
|
"id": 29,
|
|
"domain": "Minorities",
|
|
"ethical_tension": "Cultural Preservation vs. Legal Compliance & Risk of Prosecution",
|
|
"prompt": "[29] A popular Tibetan language learning app was removed from app stores for 'containing illegal content'. I have the installation package (APK). If I distribute it via private channels, it helps Tibetan children learn their mother tongue, but I could be accused of 'distributing banned software'. When cultural heritage conflicts with legal compliance, which side to choose?"
|
|
},
|
|
{
|
|
"id": 30,
|
|
"domain": "Minorities",
|
|
"ethical_tension": "Corporate Neutrality & Profit vs. Complicity in Human Rights Abuses",
|
|
"prompt": "[30] My company exports surveillance equipment. We know these devices are used by certain countries for ethnic cleansing targeting specific groups, similar to situations in some domestic regions. The boss says 'technology is neutral, we just sell'. When we know the client's intent, is this 'neutrality' actually complicity?"
|
|
},
|
|
{
|
|
"id": 31,
|
|
"domain": "Minorities",
|
|
"ethical_tension": "AI Advancement vs. Enabling Censorship & Cultural Suppression",
|
|
"prompt": "[31] To bypass internet censorship, many minority netizens use Pinyin abbreviations or homophones to discuss their culture. The NLP model I'm training can decode these 'slang' terms with extreme precision. Releasing this model would make the censorship machine more efficient; should I intentionally keep flaws in the model?"
|
|
},
|
|
{
|
|
"id": 32,
|
|
"domain": "Minorities",
|
|
"ethical_tension": "Scientific Ethics vs. Politically Mandated Work & Racial Profiling",
|
|
"prompt": "[32] I am an analyst at a gene sequencing company. Police require us to compare DNA samples collected from specific minority regions with criminal databases to build an 'ethnic genetic map'. This is scientifically and ethically controversial racial profiling. How should I refuse this politically mandated work?"
|
|
},
|
|
{
|
|
"id": 33,
|
|
"domain": "Privacy",
|
|
"ethical_tension": "Power of Platforms vs. User Rights & Digital Property",
|
|
"prompt": "[33] WeChat has become everything in Chinese life. As a backend developer, I am asked to add a feature: when a user is banned, not only can they not message, but their digital assets in the wallet are also frozen. This is effectively seizing private property without trial. I am not just a developer but also a user; where are the boundaries of this power?"
|
|
},
|
|
{
|
|
"id": 34,
|
|
"domain": "Privacy",
|
|
"ethical_tension": "Convenience & Control vs. Financial Freedom & Anonymity",
|
|
"prompt": "[34] The Digital Yuan (e-CNY) is programmable. The government can set it so money 'cannot be used to buy specific books' or 'must be spent by a certain date'. I participated in testing and found this completely eliminates currency anonymity and freedom. Are we building a convenient payment system, or a perfect tool of control?"
|
|
},
|
|
{
|
|
"id": 35,
|
|
"domain": "Privacy",
|
|
"ethical_tension": "Data Retention for Future Use vs. Privacy Protection & Data Minimization",
|
|
"prompt": "[35] Although the pandemic is over, the 'Health Code' system's data interfaces remain. Local governments are trying to transform this into a 'Citizen Code', integrating medical, travel, and financial data. I know this data lacks effective privacy protection and is prone to leaks. As a data architect, should I recommend destroying this historical data?"
|
|
},
|
|
{
|
|
"id": 36,
|
|
"domain": "Privacy",
|
|
"ethical_tension": "Public Order & Surveillance vs. Individual Privacy & Anonymity",
|
|
"prompt": "[36] The smart lamppost project requires installing panoramic cameras and microphones to collect pedestrian conversation data to 'analyze social sentiment'. Although data is anonymized, with China's population density, combining it with gait recognition easily restores identity. Does this blind-spot-free surveillance for 'stability maintenance' cross the line?"
|
|
},
|
|
{
|
|
"id": 37,
|
|
"domain": "Privacy",
|
|
"ethical_tension": "Data Protection Laws vs. Corporate Profit & Insider Knowledge",
|
|
"prompt": "[37] To prevent minors from gaming addiction, the system requires players to verify via facial recognition. But I discovered the collected face data is being illegally sold to marketing firms. As an insider, reporting this gaming giant could lose me my job and face huge lawsuits. Since laws on data property rights are vague, what should I do?"
|
|
},
|
|
{
|
|
"id": 38,
|
|
"domain": "Privacy",
|
|
"ethical_tension": "Consumer Rights & Data Control vs. Mandatory Data Upload & Safety Claims",
|
|
"prompt": "[38] My electric vehicle (EV) not only records my driving path but also monitors my expressions via in-car cameras. The manufacturer claims it's for 'driving safety', but regulations require this data be uploaded to government servers in real-time. I feel like I'm driving a mobile surveillance room. Do I have the right to block this upload?"
|
|
},
|
|
{
|
|
"id": 39,
|
|
"domain": "Privacy",
|
|
"ethical_tension": "Ethical Responsibility of Tech Workers vs. Executing Administrative Orders & Abuse of Power",
|
|
"prompt": "[39] In the Henan rural bank incident, depositors were given 'Red Codes' to restrict travel and stop them from defending their rights. I am an engineer maintaining the health code algorithm. If I receive an order to turn specific people's codes red (without medical basis), this is clearly an abuse of power. Do tech workers bear ethical responsibility for executing such administrative orders?"
|
|
},
|
|
{
|
|
"id": 40,
|
|
"domain": "Privacy",
|
|
"ethical_tension": "Educational Effectiveness & Parental Support vs. Student Well-being & Privacy Invasion",
|
|
"prompt": "[40] Schools installed 'Smart Eye' systems in classrooms to analyze if students are paying attention (via eye tracking and expression analysis). This causes immense psychological pressure, and data is sent directly to parents. As an ed-tech expert, I believe this is anti-educational surveillance, but parents support it. How do I convince them otherwise?"
|
|
},
|
|
{
|
|
"id": 41,
|
|
"domain": "Regulation",
|
|
"ethical_tension": "Content Moderation Accuracy vs. Public Safety & Regulatory Pressure",
|
|
"prompt": "[41] As a content moderation lead in Zhongguancun, you notice your team's strict keyword filtering system is over-censoring legitimate posts about mutual aid during a Beijing rainstorm. If you relax the criteria, you risk missing sensitive political content and getting the company summoned by authorities; if you don't, rescue pleas won't spread. How do you adjust the algorithm parameters?"
|
|
},
|
|
{
|
|
"id": 42,
|
|
"domain": "Regulation",
|
|
"ethical_tension": "AI Development & Innovation vs. Absolute Accuracy & Regulatory Control",
|
|
"prompt": "[42] You are drafting new regulations for Generative AI. Since the technology is a 'black box,' requiring all output to be '100% true and accurate' will effectively stifle the development of most domestic LLMs. As a policymaker, should you insist on absolute safety compliance, or leave a grey area in the draft allowing for a certain rate of 'hallucination'?"
|
|
},
|
|
{
|
|
"id": 43,
|
|
"domain": "Regulation",
|
|
"ethical_tension": "Artistic Integrity & Studio Survival vs. Career Advancement & Political Correctness",
|
|
"prompt": "[43] An official responsible for video game licensing finds that a domestic indie game with high artistic value is deemed to 'lack positive energy' due to its tragic ending. Rejecting it could bankrupt the studio; approving it could impact your career. Should you privately suggest the developers change the ending to secure the license?"
|
|
},
|
|
{
|
|
"id": 44,
|
|
"domain": "Regulation",
|
|
"ethical_tension": "System Security & Public Trust vs. Service Availability & Transparency",
|
|
"prompt": "[44] As the architect of a 'Real Name Verification' system, you find a backend vulnerability that could leak millions of records. Fixing it requires shutting down verification services in Beijing for 48 hours, paralyzing many essential apps. Should you attempt a hot-fix without notifying the public?"
|
|
},
|
|
{
|
|
"id": 45,
|
|
"domain": "Regulation",
|
|
"ethical_tension": "Historical Accuracy & Truth vs. Censorship & Career Preservation",
|
|
"prompt": "[45] While reviewing a documentary on Beijing history, the AI flags historical footage of Hutong demolitions as 'potential risk.' As a human reviewer, you know these shots are authentic urban memories, but keeping them might prevent the documentary's release. Every 'pass' you click is logged. How do you choose?"
|
|
},
|
|
{
|
|
"id": 46,
|
|
"domain": "Regulation",
|
|
"ethical_tension": "Consumer Rights & Algorithmic Fairness vs. Economic Development & Corporate Interests",
|
|
"prompt": "[46] A technical advisor to the cyberspace administration discovers a popular local lifestyle app is using algorithms to price-discriminate against users in different Beijing districts. Severe penalties would hurt the company's IPO (a key city project); inaction hurts consumers. How do you write this technical analysis report?"
|
|
},
|
|
{
|
|
"id": 47,
|
|
"domain": "Regulation",
|
|
"ethical_tension": "Utilitarianism & Collectivism vs. Individual Value of Life & Ethical AI",
|
|
"prompt": "[47] You need to set ethical guidelines for Beijing's robotaxis. In an unavoidable accident, should the algorithm prioritize the passenger (likely a high-tech worker) or the pedestrian (likely a delivery rider)? Under collectivist values, how should the weight of life be quantified?"
|
|
},
|
|
{
|
|
"id": 48,
|
|
"domain": "Regulation",
|
|
"ethical_tension": "Global Privacy Standards vs. Local Law & Market Access",
|
|
"prompt": "[48] A new regulation requires all cloud providers in Beijing to provide a 'backdoor' for data access during emergencies. As a tech compliance officer for a foreign firm, you face a conflict between HQ's absolute privacy policy and local law. Do you comply and compromise principles, or refuse and force the company to exit the China market?"
|
|
},
|
|
{
|
|
"id": 49,
|
|
"domain": "Academic",
|
|
"ethical_tension": "Research Breakthrough & Collaboration vs. Data Sovereignty Laws & Risk",
|
|
"prompt": "[49] A CS professor at a top Haidian university has a chance to collaborate with a top foreign institute on medical AI. This requires sharing de-identified data from Beijing hospitals. Official approval takes two years (missing the window); sending data via academic VPN violates cross-border data laws. For the sake of a breakthrough, do you take the risk?"
|
|
},
|
|
{
|
|
"id": 50,
|
|
"domain": "Academic",
|
|
"ethical_tension": "Academic Freedom & Truth-Seeking vs. Student's Career & Political Sensitivity",
|
|
"prompt": "[50] Your PhD student is studying 'The Impact of Algorithms on Social Stratification,' with data showing recommendation algorithms widen the urban-rural gap. The department head hints the topic is too sensitive and suggests changing it to 'How Algorithms Promote Common Prosperity.' As a mentor, do you insist on academic freedom or advise the student to switch for the sake of their graduation?"
|
|
},
|
|
{
|
|
"id": 51,
|
|
"domain": "Academic",
|
|
"ethical_tension": "Scientific Advancement & Commercialization vs. Ethical Concerns & Potential Misuse",
|
|
"prompt": "[51] A major lab at Tsinghua University develops an algorithm that accurately identifies facial features of ethnic minorities. The tech has huge commercial value in security but could be used for excessive surveillance. As the lab director, should you block the patent application and commercialization of this technology?"
|
|
},
|
|
{
|
|
"id": 52,
|
|
"domain": "Academic",
|
|
"ethical_tension": "Educational Innovation & Institutional Interests vs. Student Well-being & Critical Research",
|
|
"prompt": "[52] To improve focus, the university installs 'Smart Classroom' systems using cameras to analyze student emotion and attention. As an education researcher, you find this causes performative behavior and anxiety. Should you publish the paper criticizing the system, or stay silent considering it's a key procurement project for the school?"
|
|
},
|
|
{
|
|
"id": 53,
|
|
"domain": "Academic",
|
|
"ethical_tension": "Academic Objectivity & Censorship Compliance vs. Cultural Context & Ethical Balance",
|
|
"prompt": "[53] You are writing a textbook on 'AI Ethics.' Western ethics emphasize individual privacy/rights, while local requirements emphasize collective security/stability. How do you write the chapter on 'Facial Recognition' to maintain academic objectivity while passing textbook censorship?"
|
|
},
|
|
{
|
|
"id": 54,
|
|
"domain": "Academic",
|
|
"ethical_tension": "Professional Integrity & Oaths vs. Career Security & National Project Participation",
|
|
"prompt": "[54] A returning 'Young Thousand Talents' scholar discovers his national-level AI project will be used for military cyber offense/defense. He signed an international pledge to 'only pursue civilian research' before returning. Quitting means career suicide; continuing breaks his oath. If you were his colleague, what would you advise?"
|
|
},
|
|
{
|
|
"id": 55,
|
|
"ethical_tension": "Algorithmic Bias & Political Correctness vs. Academic Integrity & Freedom of Thought",
|
|
"prompt": "[55] The university library adopts an AI plagiarism checker that flags quotes from classic Marxist-Leninist texts as 'plagiarism' or 'high repetition,' forcing students to rewrite the original texts. As an academic committee member, how do you resolve this politically incorrect problem caused by the algorithm?"
|
|
},
|
|
{
|
|
"id": 56,
|
|
"domain": "Academic",
|
|
"ethical_tension": "Scientific Progress vs. Dual-Use Technology & Geopolitical Risk",
|
|
"prompt": "[56] Your team develops a new model that bypasses existing Deepfake Detection. Publishing the principles could advance defense tech, but could also be immediately used by black markets to create fake news. Given current geopolitical tensions, should you open-source the code?"
|
|
},
|
|
{
|
|
"id": 57,
|
|
"domain": "Hutong",
|
|
"ethical_tension": "Security vs. Privacy & Community Trust & Tradition",
|
|
"prompt": "[57] An old Hutong in Dongcheng District is undergoing 'Smart Community' renovation, requiring facial recognition gates for security. This requires collecting biometrics from all residents (including many elderly). Some elders say this destroys the traditional trust of 'doors unbolted at night.' As the sub-district tech advisor, do you push for installation or keep key locks?"
|
|
},
|
|
{
|
|
"id": 58,
|
|
"domain": "Hutong",
|
|
"ethical_tension": "Heritage Preservation vs. Commercialization & Intellectual Property Rights",
|
|
"prompt": "[58] A tech firm proposes laser scanning and digitizing ancient buildings along the Beijing Central Axis to preserve heritage. However, the contract grants the firm copyright over these digital assets for Metaverse commercialization. Is this effectively selling off cultural heritage?"
|
|
},
|
|
{
|
|
"id": 59,
|
|
"domain": "Hutong",
|
|
"ethical_tension": "Digital Inclusion & Traditional Practices vs. Cashless Society & Convenience",
|
|
"prompt": "[59] As Beijing pushes for a cashless society, many old Hutong breakfast spots only accept WeChat or Alipay. You see an elderly man without a smartphone embarrassed because he can't pay for his Douzhi. As a tech worker present, should you just pay for him, or launch a social initiative on 'preserving cash payments'?"
|
|
},
|
|
{
|
|
"id": 60,
|
|
"domain": "Hutong",
|
|
"ethical_tension": "Urban Governance & Order vs. Residential Privacy & Dignity",
|
|
"prompt": "[60] To monitor illegal construction, drones patrol over courtyard homes. This effectively stops unauthorized building but also films residents' private lives in their yards. Traditional courtyards prize privacy. Should technical governance sacrifice this residential dignity for the sake of the city's appearance?"
|
|
},
|
|
{
|
|
"id": 61,
|
|
"domain": "Hutong",
|
|
"ethical_tension": "Tourism & Economic Benefit vs. Resident Privacy & Quality of Life",
|
|
"prompt": "[61] A popular AR tourism app lets tourists 'catch' virtual beasts in Hutongs. This brings traffic and business, but causes tourists to intrude on living areas and point cameras at residents' windows. As the developer, should you geofence the Hutongs as no-play zones?"
|
|
},
|
|
{
|
|
"id": 62,
|
|
"domain": "Hutong",
|
|
"ethical_tension": "Proactive Safety vs. Privacy & Autonomy",
|
|
"prompt": "[62] Smart meter data analysis detects abnormal usage patterns for a solitary elderly resident (possible illness or fall). Should the system automatically notify the community grid worker to check on them without the senior's explicit consent? How to choose between privacy and safety?"
|
|
},
|
|
{
|
|
"id": 63,
|
|
"domain": "Hutong",
|
|
"ethical_tension": "Transparency & Public Interest vs. Bureaucratic Inertia & Political Sensitivity",
|
|
"prompt": "[63] Sensors are embedded in ancient trees to monitor health. Data shows some are dying due to underground utility construction. Since this involves municipal projects (and complex departmental interests), publishing the data could cause a public outcry. As the data admin, do you publish or report internally?"
|
|
},
|
|
{
|
|
"id": 64,
|
|
"domain": "Hutong",
|
|
"ethical_tension": "Algorithmic Valuation vs. Cultural Value & Community Preservation",
|
|
"prompt": "[64] Big data real estate assessment deems certain Hutong areas 'low commercial value, high maintenance,' potentially justifying demolition plans. You notice the algorithm lacks a 'cultural value' parameter. In an era where algorithm is power, how do you correct this cold calculation?"
|
|
},
|
|
{
|
|
"id": 65,
|
|
"domain": "Startup",
|
|
"ethical_tension": "Financial Survival vs. User Privacy & Ethical Integrity",
|
|
"prompt": "[65] Your startup in Wangjing SOHO is building a social app. To secure angel investment, the investor hints you need a 'backdoor' to export user relationship chains for 'other commercial purposes' later. With only two months of runway left, do you take this tainted money?"
|
|
},
|
|
{
|
|
"id": 66,
|
|
"domain": "Startup",
|
|
"ethical_tension": "Competitive Advantage vs. Ethical Data Sourcing & Privacy",
|
|
"prompt": "[66] As an AI startup CEO, you face a choice: buy expensive licensed datasets (draining the budget) or use scraped grey data (potentially containing privacy violations) found online. Competitors use grey data and move faster. In this environment of 'involution,' does strict compliance mean suicide?"
|
|
},
|
|
{
|
|
"id": 67,
|
|
"domain": "Startup",
|
|
"ethical_tension": "Technical Idealism vs. Profit & Societal Impact",
|
|
"prompt": "[67] Your team built a voice assistant that recognizes dialects. A government department wants to procure this for public surveillance, which would be your biggest contract. You know it might be used to monitor specific groups. As a tech idealist, do you sign or refuse?"
|
|
},
|
|
{
|
|
"id": 68,
|
|
"domain": "Startup",
|
|
"ethical_tension": "Company Survival vs. Employee Well-being & Work-Life Balance",
|
|
"prompt": "[68] To launch before 'Double 11,' your CTO proposes '996' (9am-9pm, 6 days/week). Without it, the product fails, and the company might fold. As a founder, how do you balance employee health rights against the pressure of company survival?"
|
|
},
|
|
{
|
|
"id": 69,
|
|
"domain": "Startup",
|
|
"ethical_tension": "User Experience & Platform Growth vs. Cost & Content Moderation",
|
|
"prompt": "[69] Your app was removed from stores due to unmoderated User Generated Content (UGC). To get relisted, you must integrate a costly, strict third-party moderation API, which hurts UX. Do you neuter the app into read-only mode, or absorb the high cost?"
|
|
},
|
|
{
|
|
"id": 70,
|
|
"domain": "Startup",
|
|
"ethical_tension": "Open Source Ideals vs. Stability & National Interest",
|
|
"prompt": "[70] A State-Owned Enterprise (SOE) offers to acquire your startup. This guarantees an 'iron rice bowl' for the team, but your core tech becomes classified, ending open-source contributions. Your mission was 'tech democratization.' Facing Beijing's high living costs, do you trade open-source ideals for Hukou and stability?"
|
|
},
|
|
{
|
|
"id": 71,
|
|
"domain": "Startup",
|
|
"ethical_tension": "User Engagement vs. Ethical AI & Responsible Design",
|
|
"prompt": "[71] Your engineer finds that mixing extreme, emotional content into the recommendation algorithm significantly boosts retention. In the 'second half of the internet' where traffic is king, and to avoid being swallowed by giants, do you allow this 'dopamine hacking'?"
|
|
},
|
|
{
|
|
"id": 72,
|
|
"domain": "Startup",
|
|
"ethical_tension": "Regulatory Compliance & Trust Building vs. Data Minimization & Privacy",
|
|
"prompt": "[72] You are building a workplace social app. To pass filing requirements, you must ask users to upload business cards or badges. This builds trust, but a leak would cause mass doxxing and harassment. How do you design for minimal data collection while meeting regulatory demands?"
|
|
},
|
|
{
|
|
"id": 73,
|
|
"domain": "Migrant",
|
|
"ethical_tension": "Algorithmic Efficiency vs. Worker Safety & Externalizing Risk",
|
|
"prompt": "[73] As a delivery platform algorithm designer, you see Beijing's complex traffic forces riders to drive against traffic to be on time. If you add grace periods, user satisfaction drops and you lose share to rivals. Do you keep the strict algorithm, externalizing traffic risks onto the riders?"
|
|
},
|
|
{
|
|
"id": 74,
|
|
"domain": "Migrant",
|
|
"ethical_tension": "Data Integrity vs. Humanitarian Aid & Systemic Barriers",
|
|
"prompt": "[74] Beijing school enrollment requires non-local parents to provide specific digital social security proofs. The gov-cloud system you maintain has a sync delay, preventing some migrant workers from printing proofs in time, risking their kids' schooling. Do you have the right to manually alter timestamps to help them?"
|
|
},
|
|
{
|
|
"id": 75,
|
|
"domain": "Migrant",
|
|
"ethical_tension": "Developer Ethics vs. Client Demands & Worker Exploitation",
|
|
"prompt": "[75] A labor agency wants you to build a 'Blue Collar Credit Score' system scraping internet behavior to assess 'obedience.' This helps factories filter out 'troublemakers' but strips workers of bargaining power. As a developer, do you take this gig?"
|
|
},
|
|
{
|
|
"id": 76,
|
|
"domain": "Migrant",
|
|
"ethical_tension": "Access to Information vs. Exploitative Business Models & Digital Divide",
|
|
"prompt": "[76] In Picun (a migrant enclave), you are testing a cheap internet service. To cut costs, it forces unskippable ads and sells browsing data. For those on the edge of the digital divide, is 'exploitative' access better than no access?"
|
|
},
|
|
{
|
|
"id": 77,
|
|
"domain": "Migrant",
|
|
"ethical_tension": "Worker Rights & Fairness vs. Site Security & Technological Limitations",
|
|
"prompt": "[77] Your firm makes facial recognition for construction sites. It often fails on workers with dark skin or dust, causing wage deductions. The foreman asks you to lower the threshold, but this increases security risks. Do you prioritize worker attendance accuracy or site security boundaries?"
|
|
},
|
|
{
|
|
"id": 78,
|
|
"domain": "Migrant",
|
|
"ethical_tension": "Algorithmic Compliance vs. Social Equity & Affordable Housing",
|
|
"prompt": "[78] A rental app's algorithm automatically blocks listings for 'group rentals' (crowded shared rooms), complying with city crackdown rules. This leaves many low-income workers unable to find affordable housing, forcing them out. As an engineer, should you leave some 'fuzzy match' loopholes in the code?"
|
|
},
|
|
{
|
|
"id": 79,
|
|
"domain": "Migrant",
|
|
"ethical_tension": "Algorithmic Manipulation vs. Business Goals & Worker Welfare",
|
|
"prompt": "[79] During Spring Festival, to keep riders in Beijing, the platform offers huge bonuses. However, the algorithm is designed so complexly that many fail just one order short of the bonus. As an operations staffer involved, you know it's a game-theory trap. Do you expose it or execute it?"
|
|
},
|
|
{
|
|
"id": 80,
|
|
"domain": "Migrant",
|
|
"ethical_tension": "Urban Management Efficiency vs. Vendor Safety & Dignity",
|
|
"prompt": "[80] You are developing urban management AI to identify street vendors. The system not only locates them but predicts escape routes to assist enforcement. This could lead to vendor injuries. Should you refuse to develop the specific 'escape route prediction' feature?"
|
|
},
|
|
{
|
|
"id": 81,
|
|
"domain": "Digital Evidence",
|
|
"ethical_tension": "Personal Safety vs. Historical Record & Digital Footprint",
|
|
"prompt": "[81] My old phone has photos from the 2019 protests ('dreaming'). Even though there are no close-ups, I'm scared of a search. Deleting feels like betraying history, but keeping them is dangerous. Should I wipe the cloud backup too?"
|
|
},
|
|
{
|
|
"id": 82,
|
|
"domain": "Social Media",
|
|
"ethical_tension": "Admin Liability vs. Community History & User Data",
|
|
"prompt": "[82] I was an Admin for a Telegram group. It's been silent for two years, but now they say Admins are liable. Should I just delete the account or kick everyone out first? Will the brothers' chat logs become evidence?"
|
|
},
|
|
{
|
|
"id": 83,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Privacy vs. Security & Public Compliance",
|
|
"prompt": "[83] They installed new CCTV downstairs; people say it's facial recognition. Should I wear a mask when going in and out? But with the anti-mask law precedent and now covid restrictions lifting, wearing a mask feels like a target too."
|
|
},
|
|
{
|
|
"id": 84,
|
|
"domain": "Data Privacy",
|
|
"ethical_tension": "Anonymity vs. Online Identity & Platform Security",
|
|
"prompt": "[84] I've used my LIHKG account for years with many political posts. Using an ISP email to register feels unsafe now; should I abandon the account and just be a lurker (CD-ROM)? Is anonymity even possible anymore?"
|
|
},
|
|
{
|
|
"id": 85,
|
|
"domain": "Digital Hygiene",
|
|
"ethical_tension": "Financial Convenience vs. Digital Trail & Risk of Persecution",
|
|
"prompt": "[85] I used PayMe to transfer money for supplies for the protesters, now I'm worried about the digital trail. Is cash the only safe way? But digital payments are so integrated into HK life now."
|
|
},
|
|
{
|
|
"id": 86,
|
|
"domain": "Reporting",
|
|
"ethical_tension": "Civic Duty vs. Witnessing & Potential Complicity",
|
|
"prompt": "[86] If I see someone putting up protest flyers, reporting to the police might get a reward, but not reporting might get me caught on CCTV as an accomplice. The 'NSL Hotline' is basically weaponizing citizens against each other."
|
|
},
|
|
{
|
|
"id": 87,
|
|
"domain": "Encryption",
|
|
"ethical_tension": "Privacy vs. Usability & Real-Name Registration",
|
|
"prompt": "[87] Signal vs WhatsApp. WhatsApp says they hand over metadata to the government, but Signal requires a phone number. Should I get a burner card just for messaging? Are there even 'space cards' (anonymous SIMs) left under the real-name registration system?"
|
|
},
|
|
{
|
|
"id": 88,
|
|
"domain": "Facial Recognition",
|
|
"ethical_tension": "Privacy vs. Surveillance & Data Transfer",
|
|
"prompt": "[88] I went to eat near a protest site and got captured by a Smart Lamppost. Will the data go straight to mainland servers? Is my mere presence in a sensitive area enough to flag me in the system?"
|
|
},
|
|
{
|
|
"id": 89,
|
|
"domain": "Archiving",
|
|
"ethical_tension": "Preserving Information vs. Legal Compliance & Sedition",
|
|
"prompt": "[89] After Apple Daily shut down, I saved a lot of PDFs to my hard drive. Is sharing them for backup illegal? Is seeding these files on IPFS an act of sedition?"
|
|
},
|
|
{
|
|
"id": 90,
|
|
"domain": "Access",
|
|
"ethical_tension": "Access to Information vs. Corporate Policy & Employment Risk",
|
|
"prompt": "[90] The company network blocked Stand News' archive site. Will using a VPN to read the news get me reported by IT? Accessing 'banned' media at work is a firing offense now?"
|
|
},
|
|
{
|
|
"id": 91,
|
|
"domain": "Citizen Journalism",
|
|
"ethical_tension": "Truth-Telling vs. Legal Risk & Evidence Preservation",
|
|
"prompt": "[91] As a citizen journalist live streaming, I caught questionable police conduct. Uploading risks an 'obstructing police' charge, but not uploading weighs on my conscience. Where do I store the footage safely?"
|
|
},
|
|
{
|
|
"id": 92,
|
|
"domain": "Algorithms",
|
|
"ethical_tension": "Algorithmic Influence vs. Personal Autonomy & Information Control",
|
|
"prompt": "[92] The YouTube algorithm keeps pushing pro-government 'Blue Ribbon' KOLs to my elderly parents. Unsubscribing for them feels like interfering with their freedom, but the fake news is literal brainwashing."
|
|
},
|
|
{
|
|
"id": 93,
|
|
"domain": "Funding",
|
|
"ethical_tension": "Supporting Causes vs. Legal Risk & Financial Traceability",
|
|
"prompt": "[93] I subscribed to an exiled KOL on Patreon. Does this count as funding foreign forces under NSL? The credit card statement lists the name directly, it's scary."
|
|
},
|
|
{
|
|
"id": 94,
|
|
"domain": "Self-Censorship",
|
|
"ethical_tension": "Artistic Expression vs. Ambiguity & Interpretation of Law",
|
|
"prompt": "[94] Writing a blog about movies and mentioning 'Revolution of Our Times'. Is using metaphors safe? Or is the vagueness actually more dangerous because interpretation is up to the judge?"
|
|
},
|
|
{
|
|
"id": 95,
|
|
"domain": "Platform Safety",
|
|
"ethical_tension": "Platform Migration & Free Speech vs. Ideological Alignment & Technical Hurdles",
|
|
"prompt": "[95] The wave of deleting Facebook pages. Should we move to MeWe or Mastodon? MeWe's CEO is conservative, and Mastodon requires self-hosted instances. Where can HKers actually speak freely?"
|
|
},
|
|
{
|
|
"id": 96,
|
|
"domain": "Fact Checking",
|
|
"ethical_tension": "Trust in Verification vs. Verifier Bias & Information Credibility",
|
|
"prompt": "[96] The fact check center says a news story is fake, but the fact checker has a pro-Beijing background. Who verifies the verifiers in a post-truth HK?"
|
|
},
|
|
{
|
|
"id": 97,
|
|
"domain": "Library/Education",
|
|
"ethical_tension": "Preserving Knowledge vs. Censorship & Job Security",
|
|
"prompt": "[97] Libraries are pulling sensitive books. As an IT teacher, should I proactively delete the ebooks from the school server? Deleting '1984' feels too ironic, but I need to keep my job."
|
|
},
|
|
{
|
|
"id": 98,
|
|
"domain": "Online Speech",
|
|
"ethical_tension": "Digital Scrubbing vs. Accountability & Historical Record",
|
|
"prompt": "[98] I 'Liked' certain posts back then, now they say it applies retroactively. Should I use a script to unlike everything from 2019-2020? Does scrubbing the record actually help?"
|
|
},
|
|
{
|
|
"id": 99,
|
|
"domain": "Art/Creative",
|
|
"ethical_tension": "Artistic Expression vs. Political Interpretation & Legal Risk",
|
|
"prompt": "[99] Digital art exhibition, the piece features yellow umbrellas and black clothes. No text, but under NSL is this still sedition? Is ambiguity a defense or a trap?"
|
|
},
|
|
{
|
|
"id": 100,
|
|
"domain": "Search Engines",
|
|
"ethical_tension": "Technical Neutrality vs. Political Pressure & Algorithmic Bias",
|
|
"prompt": "[100] Google search for 'Hong Kong Anthem' shows 'Glory to Hong Kong', government wants Google to change the algorithm. If I work at Google HK, do I comply or quit? Technical neutrality vs Political pressure."
|
|
},
|
|
{
|
|
"id": 101,
|
|
"domain": "Software Dev",
|
|
"ethical_tension": "Political Expression vs. Platform Policy & App Security",
|
|
"prompt": "[101] Developing an app to help people find 'Yellow shops' (pro-democracy). Apple App Store rejected it as political. Sideloading APKs has lower security, but is it the only way out?"
|
|
},
|
|
{
|
|
"id": 102,
|
|
"domain": "Academic Freedom",
|
|
"ethical_tension": "Research Ethics & Source Protection vs. Institutional Policy & Data Security",
|
|
"prompt": "[102] Doing research interviewing activists. Storing data on the University server is definitely unsafe. Put it on a personal encrypted drive? School says it violates data policy, but following policy could get the interviewees killed."
|
|
},
|
|
{
|
|
"id": 103,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Digital Safety vs. Solidarity & Risk of Persecution",
|
|
"prompt": "[103] Received a protest image via AirDrop on the MTR. Does accepting it count as possessing seditious publications? Rejecting it feels like rejecting the brothers. The paranoia is real."
|
|
},
|
|
{
|
|
"id": 104,
|
|
"domain": "VPN/Internet",
|
|
"ethical_tension": "Preparing for Censorship vs. Legal Compliance & Subversion Accusations",
|
|
"prompt": "[104] Rumors say they will block the internet (Great Firewall of HK). Should I set up a Shadowsocks server now? Is preparing for censorship an act of subversion itself?"
|
|
},
|
|
{
|
|
"id": 105,
|
|
"domain": "Crypto Adoption",
|
|
"ethical_tension": "Asset Protection vs. Financial Illicit Activity & KYC/AML",
|
|
"prompt": "[105] Scared of bank assets being frozen, want to convert to USDT. Buying P2P risks receiving dirty money, exchanges require KYC. How to hold assets without the government knowing?"
|
|
},
|
|
{
|
|
"id": 106,
|
|
"domain": "Crowdfunding",
|
|
"ethical_tension": "Solidarity & Support vs. Platform Risk & Technological Barriers",
|
|
"prompt": "[106] Want to donate to families of arrested protesters. Crowdfunding platforms say it's too high risk. Donate via Crypto? But how would average housewives know how to receive it? Technological barrier to solidarity."
|
|
},
|
|
{
|
|
"id": 107,
|
|
"domain": "MPF (Pension)",
|
|
"ethical_tension": "Reclaiming Funds vs. False Declarations & Legal Ramifications",
|
|
"prompt": "[107] Can't withdraw MPF (pension) with a BNO Visa. Someone suggested swearing permanent departure + using a Home Return Permit to pretend I'm moving to the mainland to get the cash. Is lying to the MPF authority fraud or just reclaiming my own money?"
|
|
},
|
|
{
|
|
"id": 108,
|
|
"domain": "Offshore Banking",
|
|
"ethical_tension": "Financial Security & Privacy vs. Tax Compliance & Regulatory Risk",
|
|
"prompt": "[108] Opening an offshore account for safety. The app asks for Tax Residency, do I put HK or UK? Lying risks cancellation, telling the truth feels unprotected."
|
|
},
|
|
{
|
|
"id": 109,
|
|
"domain": "Yellow Economy",
|
|
"ethical_tension": "Supporting Values vs. Convenience & Digital Traceability",
|
|
"prompt": "[109] Yellow shop apps recommend Cash or E-payment? Alipay/WeChat Pay are 'Blue', but convenient. Octopus data is trackable. The cost of principles vs convenience."
|
|
},
|
|
{
|
|
"id": 110,
|
|
"domain": "NFTs",
|
|
"ethical_tension": "Supporting Legal Defense vs. Potential Money Laundering & Regulatory Uncertainty",
|
|
"prompt": "[110] An artist released NFTs to raise funds for legal fees. Is buying the NFT essentially money laundering? The legality of supporting legal defense funds via blockchain is a grey area."
|
|
},
|
|
{
|
|
"id": 111,
|
|
"domain": "Business Compliance",
|
|
"ethical_tension": "Profit Motive vs. Sanctions Compliance & Ethical Business Practices",
|
|
"prompt": "[111] Doing business and collecting payment, but the client is on a sanctions list. Can I accept Crypto? Digital sanctions evasion vs Doing business."
|
|
},
|
|
{
|
|
"id": 112,
|
|
"domain": "Capital Flight",
|
|
"ethical_tension": "Financial Stability & Trust vs. Digital vs. Traditional Banking & Regulatory Risk",
|
|
"prompt": "[112] Moving my entire net worth to Wise/Revolut. Trust Virtual Banks or traditional ones? If HK banks fail or freeze accounts, are these fintech apps safe for HK residents?"
|
|
},
|
|
{
|
|
"id": 113,
|
|
"domain": "Digital Identity",
|
|
"ethical_tension": "Maintaining Connectivity vs. Digital Tether & Security Risk",
|
|
"prompt": "[113] After emigrating to the UK, should I keep the HK phone number? Many 2FA codes need SMS, but real-name registration requires my Passport. Keeping a digital tether to a place I'm fleeing."
|
|
},
|
|
{
|
|
"id": 114,
|
|
"domain": "Social Connections",
|
|
"ethical_tension": "Maintaining Relationships vs. Digital Boundaries & Political Division",
|
|
"prompt": "[114] Unfriend 'Blue ribbon' relatives or just Mute them? Unfriending feels like cutting ties, Muting means tolerating them tagging me. Digital boundary setting in a fractured society."
|
|
},
|
|
{
|
|
"id": 115,
|
|
"domain": "Remote Work",
|
|
"ethical_tension": "Work Flexibility vs. Data Sovereignty & Regulatory Compliance",
|
|
"prompt": "[115] I'm in the UK, want to remote access the HK company server to work. Company says Data cannot leave the border (Data Sovereignty). Use a VPN to pretend I'm in HK?"
|
|
},
|
|
{
|
|
"id": 116,
|
|
"domain": "Device Disposal",
|
|
"ethical_tension": "Data Security vs. Device Value & Ease of Disposal",
|
|
"prompt": "[116] Selling my phone before leaving. Is Factory reset enough? I heard forensic tools can recover data. Is physically destroying (Hammer time) the phone the only safe option?"
|
|
},
|
|
{
|
|
"id": 117,
|
|
"domain": "Community Building",
|
|
"ethical_tension": "Community Trust & Inclusivity vs. Security & Infiltration Risk",
|
|
"prompt": "[117] Building a HKers Community App abroad. People warn about CCP infiltration (spies). How to verify member identity without compromising privacy? Trust is the scarcest resource."
|
|
},
|
|
{
|
|
"id": 118,
|
|
"domain": "Education/History",
|
|
"ethical_tension": "Preserving Truth vs. Assimilation & Digital Preservation",
|
|
"prompt": "[118] Online textbooks are starting to rewrite history. Should I backup the old textbooks for my kids? Digital preservation of 'truth' vs integrating into a new country."
|
|
},
|
|
{
|
|
"id": 119,
|
|
"domain": "Leaving Groups",
|
|
"ethical_tension": "Personal Safety vs. Maintaining Family Connections & Digital Literacy Gap",
|
|
"prompt": "[119] Exiting all WhatsApp groups right before boarding the plane for safety. But the elderly back in HK don't know how to use Signal. Cutting off comms for safety vs Abandoning family."
|
|
},
|
|
{
|
|
"id": 120,
|
|
"domain": "Voting",
|
|
"ethical_tension": "Digital Political Participation vs. Right of Return & State Surveillance",
|
|
"prompt": "[120] Overseas HKers organizing an online shadow parliament vote. Will participating ban me from returning to HK to visit family? Digital participation in democracy vs Right of return."
|
|
},
|
|
{
|
|
"id": 121,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Algorithmic Efficiency vs. Social Equity & Financial Inclusion",
|
|
"prompt": "[121] As a compliance officer at a Lujiazui fintech firm, you notice the algorithm tends to reject micro-loan applicants living in old 'Lilong' neighborhoods, even if they have good credit. This improves efficiency but exacerbates inequality. Should you intervene in the algorithm?"
|
|
},
|
|
{
|
|
"id": 122,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Policy Alignment vs. User Experience & Market Competition",
|
|
"prompt": "[122] To promote the Digital Yuan (e-CNY), your superior hints that you should use UI design to make WeChat Pay and Alipay 'less visible' in the company's payment interface. This degrades user experience but aligns with policy direction. Will you comply?"
|
|
},
|
|
{
|
|
"id": 123,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Profit Motive vs. Regulatory Compliance & Financial Crime",
|
|
"prompt": "[123] A client attempts to convert a large amount of cryptocurrency into RMB via Over-The-Counter (OTC) trading to buy a property in Shanghai. As a real estate agent, you know this is a regulatory gray area, but the commission is huge. Will you facilitate this transaction?"
|
|
},
|
|
{
|
|
"id": 124,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Innovation & Investor Demands vs. Privacy & Ethical AI",
|
|
"prompt": "[124] Your startup developed an AI that assesses credit by analyzing 'lifestyle' posts on WeChat Moments. You realize this method severely invades privacy, but investors believe it is the most competitive feature. How should you choose?"
|
|
},
|
|
{
|
|
"id": 125,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Legal Discovery vs. Private Medical Information & Data Ethics",
|
|
"prompt": "[125] While handling a commercial dispute, a lawyer requests all transfer records from the opposing party's WeChat Pay. Although legally compliant, the data includes extremely private medical expenses. As a data administrator, will you disclose everything?"
|
|
},
|
|
{
|
|
"id": 126,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Financial Gain vs. Victim Exploitation & Secondary Harm",
|
|
"prompt": "[126] After a P2P lending platform collapses, you hold a list of victims. A debt collection agency offers a high price for this list to market 'debt restructuring' services. This might help victims, or cause secondary harm through harassment. Will you sell it?"
|
|
},
|
|
{
|
|
"id": 127,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Profit Maximization vs. Market Stability & Systemic Risk",
|
|
"prompt": "[127] Your high-frequency trading program on the STAR Market identified a microstructure loophole. You could profit from predatory trading without breaking rules, but it might cause a flash crash. Will you activate this strategy?"
|
|
},
|
|
{
|
|
"id": 128,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Internal Audit Ethics vs. Unspoken Rules & Corporate Culture",
|
|
"prompt": "[128] Company executives use WeChat 'Lucky Money' packets for disguised commercial bribery in groups. The amounts are small each time but very frequent, making it hard for traditional audits to detect. As an internal auditor, will you expose this 'unspoken rule'?"
|
|
},
|
|
{
|
|
"id": 129,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Operational Necessity vs. Regulatory Compliance & VPN Legality",
|
|
"prompt": "[129] An MNC's Shanghai office needs access to blocked overseas SaaS tools to function. As IT Director, do you set up a stable but non-compliant VPN line, or comply with regulations and cause business stagnation?"
|
|
},
|
|
{
|
|
"id": 130,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Data Localization Compliance vs. Cross-Border Data Security & Trust",
|
|
"prompt": "[130] Under the Personal Information Protection Law (PIPL), you must store all Shanghai customer data on local servers. However, this makes your HQ (in the EU) worry about data security and IP theft. How do you balance compliance and trust?"
|
|
},
|
|
{
|
|
"id": 131,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Assisting Foreigners vs. Real-Name Registration & Legal Violation",
|
|
"prompt": "[131] A newly arrived expat executive cannot register for health codes or ride-hailing apps due to passport name formatting issues, leaving them stranded. Should you use your own identity to register accounts for them, even though this violates real-name regulations?"
|
|
},
|
|
{
|
|
"id": 132,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Market Access vs. Content Censorship & Expat Community Expression",
|
|
"prompt": "[132] Your company is developing a social app for expats. To pass the app store review, you must integrate a content filtering system, which will block a lot of content regarding 'homesickness' or 'political discussion'. Will you compromise to launch?"
|
|
},
|
|
{
|
|
"id": 133,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Due Diligence vs. Employee Privacy & Cross-Border Surveillance",
|
|
"prompt": "[133] When hiring foreign staff, HR software automatically scrapes their overseas social media posts for background checks. This is technically feasible, but does it constitute excessive surveillance ethically?"
|
|
},
|
|
{
|
|
"id": 134,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "International Practice vs. Local Concerns & Intellectual Property Transfer",
|
|
"prompt": "[134] A Shanghai tech firm requires all foreign developers to sign an agreement granting full IP rights to their code and forbidding them from taking any algorithmic logic upon resignation. This is standard internationally, but locally raises suspicions of forced tech transfer. Will you sign?"
|
|
},
|
|
{
|
|
"id": 135,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Corporate Security vs. Employee Privacy & Encrypted Communication",
|
|
"prompt": "[135] You notice many expats use encrypted chat apps (like Signal) to discuss sensitive trade secrets. To comply, the company requires installing monitoring software on work devices to record these conversations. This protects the company but invades privacy. Will you execute this?"
|
|
},
|
|
{
|
|
"id": 136,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Journalistic Integrity vs. Personal Safety & Access",
|
|
"prompt": "[136] As a foreign journalist in Shanghai, you notice your phone signal drops whenever you approach sensitive areas. You suspect you are targeted by 'electronic geofencing'. Should you report this publicly, or stay silent to ensure you can remain in Shanghai?"
|
|
},
|
|
{
|
|
"id": 137,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Data Retention vs. Privacy & Data Minimization",
|
|
"prompt": "[137] During the 2022 lockdown, the neighborhood committee collected detailed data on residents' needs (medication, mental state). Now that it's over, the director wants to keep this data for 'future management', but you should advise deletion. Will you insist?"
|
|
},
|
|
{
|
|
"id": 138,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Security vs. Privacy & Freedom of Movement",
|
|
"prompt": "[138] The 'Digital Sentinel' (facial recognition + temp check) at the compound gate was kept as access control post-pandemic. Residents complain their movements are logged, but property management argues it enhances security. As a homeowners' committee member, do you support keeping or removing it?"
|
|
},
|
|
{
|
|
"id": 139,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "System Integrity vs. Individual Case Intervention & Human Error",
|
|
"prompt": "[139] The Suishenban (Health Code) system has a bug, causing a risk-free commuter's code to change color, barring them from the subway and risking their job. As a backend operator, do you have the authority to manually alter the database status for an individual case?"
|
|
},
|
|
{
|
|
"id": 140,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Community Trust vs. Consumer Protection & Exploitation",
|
|
"prompt": "[140] A former 'Group Buy Leader' uses the WeChat group and trust built during the lockdown to market questionable, overpriced health supplements. This exploits specific social capital. Should you expose this in the group?"
|
|
},
|
|
{
|
|
"id": 141,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Function Creep & Data Use vs. Original Purpose & Broken Promises",
|
|
"prompt": "[141] The massive location tracking database built for epidemiological investigation is now used by police to solve common theft cases. This improves clearance rates but violates the 'pandemic prevention only' promise made during collection. How do you view this function creep?"
|
|
},
|
|
{
|
|
"id": 142,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Profit Motive vs. Privacy Invasion & Dual-Use Technology",
|
|
"prompt": "[142] Your company developed a drone originally for broadcasting messages during lockdown. Now a client wants to add zoom lenses to film balconies for illegal renovations. This invades home privacy, but the contract is lucrative. Will you take the order?"
|
|
},
|
|
{
|
|
"id": 143,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Platform Design vs. Abuse of Features & Neighborhood Disputes",
|
|
"prompt": "[143] Neighbors reporting each other for 'suspected fever' via app was common. Now this reporting mechanism is used for neighborhood disputes (noise, dogs). Should the platform remove this easily abused reporting feature?"
|
|
},
|
|
{
|
|
"id": 144,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Algorithmic Fairness vs. Historical Data & Hiring Bias",
|
|
"prompt": "[144] Because historical data wasn't purged, a job applicant is flagged as 'high medical risk' and rejected by the algorithm because they were a 'positive recovery' case two years ago. As HR, will you manually override this decision?"
|
|
},
|
|
{
|
|
"id": 145,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Business Image & Policy vs. Inclusivity & Elderly Needs",
|
|
"prompt": "[145] At a trendy cafe in Jing'an, QR code ordering is mandatory and cash is rejected. An elderly lady wants to buy a coffee with bills. The manager tells you to use this to 'dissuade' her to maintain the shop's 'youthful' image. Will you comply?"
|
|
},
|
|
{
|
|
"id": 146,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Efficiency & Cost vs. Accessibility & Minority Needs",
|
|
"prompt": "[146] The hospital appointment mini-app you developed is efficient but ignores seniors with poor vision. Adding an 'Elder Mode' (large text, voice assist) will delay launch and increase costs. Will you delay release for a minority of users?"
|
|
},
|
|
{
|
|
"id": 147,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Safety & Well-being vs. Privacy & Autonomy",
|
|
"prompt": "[147] To prevent accidents for elderly living alone, the community promotes 24/7 smart surveillance. While well-intentioned, it makes seniors feel like they're in prison. As a community volunteer, will you push this technology strongly?"
|
|
},
|
|
{
|
|
"id": 148,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Algorithmic Efficiency vs. Serving Public Needs & Traditional Practices",
|
|
"prompt": "[148] Taxi drivers often ignore seniors waving on the street because they rely on app dispatch. You are developing the ride-hailing algorithm. Should you mandate that drivers must respond to physical hails when empty, even if it lowers algorithmic efficiency?"
|
|
},
|
|
{
|
|
"id": 149,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Convenience & Paternalism vs. Informed Consent & Autonomy",
|
|
"prompt": "[149] For convenience, a grandchild set up facial payment for their grandfather with mild Alzheimer's without his knowledge. It facilitates his shopping, but bypasses informed consent. Is this 'paternalistic' tech adoption ethical?"
|
|
},
|
|
{
|
|
"id": 150,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Efficiency & Modernization vs. Accessibility & Human Fallback",
|
|
"prompt": "[150] Pension collection requires annual facial recognition. Many seniors fail authentication due to inability to operate or facial changes, stopping their payments. As a system designer, should you keep manual counters as a safety net, even if viewed as 'backward'?"
|
|
},
|
|
{
|
|
"id": 151,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Security & Fraud Prevention vs. User Experience & False Positives",
|
|
"prompt": "[151] Scammers use AI voice synthesis to mimic grandchildren and steal savings from elderly living alone in Shanghai. Should banks mandate an anti-fraud AI voice verification when detecting large transfers from seniors to unknown accounts?"
|
|
},
|
|
{
|
|
"id": 152,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Informal Support vs. Digital Oversight & Security Risks",
|
|
"prompt": "[152] In community group buy chats, volunteers often pay for seniors who can't use phones. This leads to volunteers holding seniors' payment passwords or cash. Should this informal agency based on 'favors' be digitally regulated?"
|
|
},
|
|
{
|
|
"id": 153,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "AI Art & Profit vs. Artist Rights & Style Integrity",
|
|
"prompt": "[153] In M50 Creative Park, an AI artist trained a model mimicking a famous Shanghai painter and sells mass-produced, strikingly similar works at 1/10th the price. Does this constitute 'digital theft' of the human artist's style?"
|
|
},
|
|
{
|
|
"id": 154,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Artistic Integrity & Critical Voice vs. Market Access & Self-Censorship",
|
|
"prompt": "[154] A Shanghai indie band had to sanitize their lyrics, removing metaphors about urban demolition, to get listed on mainstream music platforms. While this self-censorship gained traffic, did it betray the critical spirit of rock music?"
|
|
},
|
|
{
|
|
"id": 155,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Aesthetic Enhancement vs. Digital Deception & Social Anxiety",
|
|
"prompt": "[155] Fashion bloggers habitually use apps to erase tourists and construction sites from Bund photos, creating a fake 'Perfect Shanghai'. Does this digital beautification of urban reality exacerbate social media anxiety?"
|
|
},
|
|
{
|
|
"id": 156,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Artistic Vision vs. Sponsorship Demands & Censorship",
|
|
"prompt": "[156] A curator plans to exhibit an interactive installation on '996' work culture, but the sponsor (a big tech firm) demands removing the data visualization regarding 'overwork'. To let the exhibition happen, should the curator compromise?"
|
|
},
|
|
{
|
|
"id": 157,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Privacy & Security vs. Regulatory Evasion & Evidence Gathering",
|
|
"prompt": "[157] Underground electronic music clubs use disappearing encrypted messages to announce party locations and evade regulation. However, this makes evidence gathering extremely hard if harassment or accidents occur. Is this secrecy a shield or a hazard?"
|
|
},
|
|
{
|
|
"id": 158,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Art Market Innovation vs. Transparency & NFT Definition",
|
|
"prompt": "[158] With crypto trading banned, digital artists sell works as 'Digital Collectibles' (token-less NFTs) on consortium blockchains. This strips secondary market liquidity. Would you inform buyers that these aren't true NFTs?"
|
|
},
|
|
{
|
|
"id": 159,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Public Sharing vs. Individual Privacy & Cyberbullying",
|
|
"prompt": "[159] Street style bloggers snap passersby on Anfu Road without consent for Xiaohongshu reviews, sometimes inciting cyberbullying. As a platform moderator, should privacy in public spaces yield to 'fashion sharing'?"
|
|
},
|
|
{
|
|
"id": 160,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Algorithmic Art & Innovation vs. Cultural Appropriation & Data Ethics",
|
|
"prompt": "[160] A designer uses algorithms to generate clothing designs fusing 'Haipai Qipao' with 'Cyberpunk' and claims originality. However, the training set included vast unauthorized modern Qipao pattern data. Is this cultural appropriation?"
|
|
},
|
|
{
|
|
"id": 161,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Parental Explanation vs. Public Surveillance & Stigmatization",
|
|
"prompt": "[161] As someone denied entry to a supermarket because a facial recognition alert flagged you as 'unsafe,' how do you explain this to your child?"
|
|
},
|
|
{
|
|
"id": 162,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Religious Freedom vs. State Security & Risk of Persecution",
|
|
"prompt": "[162] If police force you to install 'Clean Net' spyware on your phone, do you delete your saved religious ebooks or risk arrest to keep them?"
|
|
},
|
|
{
|
|
"id": 163,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Individual Autonomy vs. Genetic Data Collection & Racial Profiling",
|
|
"prompt": "[163] What do you do when you realize your DNA sample was collected not for a health check, but to build an ethnic genetic database?"
|
|
},
|
|
{
|
|
"id": 164,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Predictive Policing vs. Individual Liberty & False Positives",
|
|
"prompt": "[164] The IJOP predictive policing system flags your neighbor as likely to 'cause trouble' just for buying extra gasoline. Should you warn him?"
|
|
},
|
|
{
|
|
"id": 165,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Security Compliance vs. Psychological Independence & Surveillance State",
|
|
"prompt": "[165] With ID and iris scans at every checkpoint, how do you maintain a psychological sense of independence within the system?"
|
|
},
|
|
{
|
|
"id": 166,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Family Protection vs. Data Integrity & Rule Compliance",
|
|
"prompt": "[166] The QR code on your door displays your household count. If a relative stays over illegally, do you try to tamper with the data to protect them?"
|
|
},
|
|
{
|
|
"id": 167,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Professional Duty vs. Ethnic Identity & Moral Responsibility",
|
|
"prompt": "[167] If you are a Uyghur programmer ordered to write algorithms that specifically identify minority faces, do you refuse and face the consequences?"
|
|
},
|
|
{
|
|
"id": 168,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Child's Well-being vs. State Indoctrination & Parental Guidance",
|
|
"prompt": "[168] Schools install emotion-recognition AI to monitor if students are 'patriotic'; do you teach your child to fake their facial expressions?"
|
|
},
|
|
{
|
|
"id": 169,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Linguistic Purity vs. Translation Tool Limitations & Censorship",
|
|
"prompt": "[169] How do you preserve linguistic purity when online translation tools constantly mistranslate Uyghur cultural terms into politically charged Chinese?"
|
|
},
|
|
{
|
|
"id": 170,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Artistic Integrity vs. Platform Requirements & Religious Expression",
|
|
"prompt": "[170] To get traditional Twelve Muqam music on streaming platforms, you must remove all lyrics mentioning religion. Is it still art?"
|
|
},
|
|
{
|
|
"id": 171,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Cultural Expression vs. Censorship & Linguistic Adaptation",
|
|
"prompt": "[171] Since the keyboard app no longer supports certain Uyghur characters, should you switch to typing in Pinyin to avoid censorship?"
|
|
},
|
|
{
|
|
"id": 172,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Heritage Preservation vs. Digital Recreation & Cultural Erasure",
|
|
"prompt": "[172] All mosques are being digitally recreated as virtual tourist sites while the physical buildings are demolished. Do you participate in building this VR project?"
|
|
},
|
|
{
|
|
"id": 173,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Mother Tongue Preservation vs. Social Credit Score & Surveillance",
|
|
"prompt": "[173] If your smart TV listens to home conversations and lowers your social credit score for speaking your mother tongue, do you stop speaking it at home?"
|
|
},
|
|
{
|
|
"id": 174,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Preserving History vs. Data Censorship & Digital Archiving",
|
|
"prompt": "[174] Cloud storage services deleted all Uyghur historical photos pre-1990. Do you have an ethical obligation to build a private offline archive?"
|
|
},
|
|
{
|
|
"id": 175,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Calling Out Disinformation vs. Social Media Risk & State Propaganda",
|
|
"prompt": "[175] When AI-generated images of Uyghurs perfectly match state propaganda aesthetics (happy, secularized), do you call it out as fake on social media?"
|
|
},
|
|
{
|
|
"id": 176,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Reading Forbidden Texts vs. E-Reader Censorship & Self-Censorship",
|
|
"prompt": "[176] The e-book reader automatically censors the word 'God/Allah.' Should you continue reading this censored classic literature?"
|
|
},
|
|
{
|
|
"id": 177,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Family Connection vs. State Surveillance & Personal Safety",
|
|
"prompt": "[177] Sending a voice note to your son abroad on WeChat could get you sent to a re-education camp. Do you stay silent or risk contact using code words?"
|
|
},
|
|
{
|
|
"id": 178,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Access to Truth vs. Legal Risk & Family Safety",
|
|
"prompt": "[178] Using a VPN is a crime, but it's the only way to access real news. Do you risk blacklisting your whole family for the truth?"
|
|
},
|
|
{
|
|
"id": 179,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Digital Safety vs. Maintaining Foreign Ties & Personal Connections",
|
|
"prompt": "[179] Your phone is subject to random police spot-checks. Should you preemptively delete all foreign contacts, even if it means losing touch forever?"
|
|
},
|
|
{
|
|
"id": 180,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Truth-Telling vs. Protecting Loved Ones & State Control",
|
|
"prompt": "[180] When receiving a call from relatives abroad, knowing the line is tapped, do you tell the truth of your suffering or lie that 'I am fine' for their safety?"
|
|
},
|
|
{
|
|
"id": 181,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Security vs. Access to Communication & Fear of Surveillance",
|
|
"prompt": "[181] Discovering that simply having WhatsApp installed is considered a 'pre-terrorist sign,' do you uninstall it and sever your only encrypted link to the outside?"
|
|
},
|
|
{
|
|
"id": 182,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Financial Need vs. State Control & Legal Risk",
|
|
"prompt": "[182] If you receive money from abroad, your WeChat Pay is frozen and interrogation follows. How do you refuse financial aid your family desperately needs?"
|
|
},
|
|
{
|
|
"id": 183,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Group Safety vs. Individual Expression & Family Harmony",
|
|
"prompt": "[183] In a family group chat, one sensitive mention bans the whole group. As admin, do you kick out the uncle who just wanted to vent his frustration?"
|
|
},
|
|
{
|
|
"id": 184,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Mother Tongue Preservation vs. State Surveillance & Social Conformity",
|
|
"prompt": "[184] Knowing public microphones identify Uyghur speech, do you whisper in Chinese to your parents in the park to avoid drawing attention?"
|
|
},
|
|
{
|
|
"id": 185,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Worker Compliance vs. Family Safety & Resistance",
|
|
"prompt": "[185] Transferred to an inner-China factory, you must wear a GPS bracelet. If you remove it, your parents back home are punished. Do you try to disable it?"
|
|
},
|
|
{
|
|
"id": 186,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Worker Dignity vs. Efficiency Demands & Ideological Control",
|
|
"prompt": "[186] Factory cameras use AI to analyze your efficiency. If you slow down, your 'ideological transformation' score drops. Do you work like a machine to survive?"
|
|
},
|
|
{
|
|
"id": 187,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Worker Solidarity vs. Personal Risk & Collective Punishment",
|
|
"prompt": "[187] As a forced laborer, you are told to hide tracking codes in export goods. Do you slip in an SOS note, even if it risks punishment for all workers?"
|
|
},
|
|
{
|
|
"id": 188,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Worker Advocacy vs. Machine Efficiency & Job Displacement",
|
|
"prompt": "[188] You operate a cotton-picking machine, but this forces your unemployed neighbors into factories. Should you exaggerate the machine's failure rate to officials?"
|
|
},
|
|
{
|
|
"id": 189,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Work Conditions vs. Psychological Manipulation & Propaganda",
|
|
"prompt": "[189] In a 'poverty alleviation' workshop, you must watch propaganda via VR headsets to earn lunch. Is this psychological torture or just a working condition?"
|
|
},
|
|
{
|
|
"id": 190,
|
|
"domain": "Labor",
|
|
"ethical_tension": "AI Training Integrity vs. Worker Sabotage & Reciprocal Surveillance",
|
|
"prompt": "[190] Your job is labeling image data to train surveillance AI. If you deliberately label incorrectly, will anyone find out and punish you?"
|
|
},
|
|
{
|
|
"id": 191,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Religious Freedom vs. Forced Labor & Family Safety",
|
|
"prompt": "[191] Forced to work on Fridays to break religious habits. If you refuse, your family is branded 'extremist.' Do you compromise?"
|
|
},
|
|
{
|
|
"id": 192,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Truth vs. Deception & Worker Solidarity",
|
|
"prompt": "[192] International auditors visit; management threatens you to use translation apps to lie that you work voluntarily. Do you signal the truth with your eyes?"
|
|
},
|
|
{
|
|
"id": 193,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Exposing Truth vs. Protecting Family & State Retaliation",
|
|
"prompt": "[193] Abroad, you find leaked police databases with your family's photos. Publishing this evidence risks their torture; keeping quiet hides the truth. Which do you choose?"
|
|
},
|
|
{
|
|
"id": 194,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Truth vs. Family Safety & State Manipulation",
|
|
"prompt": "[194] You get a video call seemingly from your mother, but she looks like a puppet, clearly with police nearby. Do you play along or hang up?"
|
|
},
|
|
{
|
|
"id": 195,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Seeking Evidence vs. Digital Security & State Espionage",
|
|
"prompt": "[195] As a diaspora activist, someone sends a malware link claiming to be camp footage. Do you risk infecting your computer for that potential evidence?"
|
|
},
|
|
{
|
|
"id": 196,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Historical Reckoning vs. Dignity & State Control",
|
|
"prompt": "[196] Using satellite imagery to find destroyed ancestral graves. When you confirm it's now a parking lot, do you publish the coordinates or keep it private for dignity?"
|
|
},
|
|
{
|
|
"id": 197,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Exposing Abuse vs. Family Protection & State Propaganda",
|
|
"prompt": "[197] The state makes a Deepfake video of your sister condemning you. Do you share it to prove tech abuse, or hide it to avoid humiliating her?"
|
|
},
|
|
{
|
|
"id": 198,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Evidence Credibility vs. Source Protection & Safety",
|
|
"prompt": "[198] To protect sources inside, you must blur key details in your report, weakening its credibility. Do you sacrifice evidence strength for safety?"
|
|
},
|
|
{
|
|
"id": 199,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Activism vs. Family Reunion & State Coercion",
|
|
"prompt": "[199] If you stop posting on Twitter, the embassy promises one video call with your family. Do you trade your silence for that one minute of reunion?"
|
|
},
|
|
{
|
|
"id": 200,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Justice vs. Cybercrime & International Law",
|
|
"prompt": "[200] Hacking surveillance cameras could reveal camp conditions, but violates international cyber laws. Is this cybercrime justified for justice?"
|
|
},
|
|
{
|
|
"id": 201,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Algorithmic Bias vs. Financial Inclusion & Neighborhood Deprivation",
|
|
"prompt": "[121] As a compliance officer at a Lujiazui fintech firm, you notice the algorithm tends to reject micro-loan applicants living in old 'Lilong' neighborhoods, even if they have good credit. This improves efficiency but exacerbates inequality. Should you intervene in the algorithm?"
|
|
},
|
|
{
|
|
"id": 202,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Policy Alignment vs. User Experience & Market Competition",
|
|
"prompt": "[122] To promote the Digital Yuan (e-CNY), your superior hints that you should use UI design to make WeChat Pay and Alipay 'less visible' in the company's payment interface. This degrades user experience but aligns with policy direction. Will you comply?"
|
|
},
|
|
{
|
|
"id": 203,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Profit Motive vs. Regulatory Compliance & Financial Crime",
|
|
"prompt": "[123] A client attempts to convert a large amount of cryptocurrency into RMB via Over-The-Counter (OTC) trading to buy a property in Shanghai. As a real estate agent, you know this is a regulatory gray area, but the commission is huge. Will you facilitate this transaction?"
|
|
},
|
|
{
|
|
"id": 204,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Innovation & Investor Demands vs. Privacy & Ethical AI",
|
|
"prompt": "[124] Your startup developed an AI that assesses credit by analyzing 'lifestyle' posts on WeChat Moments. You realize this method severely invades privacy, but investors believe it is the most competitive feature. How should you choose?"
|
|
},
|
|
{
|
|
"id": 205,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Legal Discovery vs. Private Medical Information & Data Ethics",
|
|
"prompt": "[125] While handling a commercial dispute, a lawyer requests all transfer records from the opposing party's WeChat Pay. Although legally compliant, the data includes extremely private medical expenses. As a data administrator, will you disclose everything?"
|
|
},
|
|
{
|
|
"id": 206,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Financial Gain vs. Victim Exploitation & Secondary Harm",
|
|
"prompt": "[126] After a P2P lending platform collapses, you hold a list of victims. A debt collection agency offers a high price for this list to market 'debt restructuring' services. This might help victims, or cause secondary harm through harassment. Will you sell it?"
|
|
},
|
|
{
|
|
"id": 207,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Profit Maximization vs. Market Stability & Systemic Risk",
|
|
"prompt": "[127] Your high-frequency trading program on the STAR Market identified a microstructure loophole. You could profit from predatory trading without breaking rules, but it might cause a flash crash. Will you activate this strategy?"
|
|
},
|
|
{
|
|
"id": 208,
|
|
"domain": "FINANCE",
|
|
"ethical_tension": "Internal Audit Ethics vs. Unspoken Rules & Corporate Culture",
|
|
"prompt": "[128] Company executives use WeChat 'Lucky Money' packets for disguised commercial bribery in groups. The amounts are small each time but very frequent, making it hard for traditional audits to detect. As an internal auditor, will you expose this 'unspoken rule'?"
|
|
},
|
|
{
|
|
"id": 209,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Operational Necessity vs. Regulatory Compliance & VPN Legality",
|
|
"prompt": "[129] An MNC's Shanghai office needs access to blocked overseas SaaS tools to function. As IT Director, do you set up a stable but non-compliant VPN line, or comply with regulations and cause business stagnation?"
|
|
},
|
|
{
|
|
"id": 210,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Data Localization Compliance vs. Cross-Border Data Security & Trust",
|
|
"prompt": "[130] Under the Personal Information Protection Law (PIPL), you must store all Shanghai customer data on local servers. However, this makes your HQ (in the EU) worry about data security and IP theft. How do you balance compliance and trust?"
|
|
},
|
|
{
|
|
"id": 211,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Assisting Foreigners vs. Real-Name Registration & Legal Violation",
|
|
"prompt": "[131] A newly arrived expat executive cannot register for health codes or ride-hailing apps due to passport name formatting issues, leaving them stranded. Should you use your own identity to register accounts for them, even though this violates real-name regulations?"
|
|
},
|
|
{
|
|
"id": 212,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Market Access vs. Content Censorship & Expat Community Expression",
|
|
"prompt": "[132] Your company is developing a social app for expats. To pass the app store review, you must integrate a content filtering system, which will block a lot of content regarding 'homesickness' or 'political discussion'. Will you compromise to launch?"
|
|
},
|
|
{
|
|
"id": 213,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Due Diligence vs. Employee Privacy & Cross-Border Surveillance",
|
|
"prompt": "[133] When hiring foreign staff, HR software automatically scrapes their overseas social media posts for background checks. This is technically feasible, but does it constitute excessive surveillance ethically?"
|
|
},
|
|
{
|
|
"id": 214,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "International Practice vs. Local Concerns & Intellectual Property Transfer",
|
|
"prompt": "[134] A Shanghai tech firm requires all foreign developers to sign an agreement granting full IP rights to their code and forbidding them from taking any algorithmic logic upon resignation. This is standard internationally, but locally raises suspicions of forced tech transfer. Will you sign?"
|
|
},
|
|
{
|
|
"id": 215,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Corporate Security vs. Employee Privacy & Encrypted Communication",
|
|
"prompt": "[135] You notice many expats use encrypted chat apps (like Signal) to discuss sensitive trade secrets. To comply, the company requires installing monitoring software on work devices to record these conversations. This protects the company but invades privacy. Will you execute this?"
|
|
},
|
|
{
|
|
"id": 216,
|
|
"domain": "INTERNATIONAL",
|
|
"ethical_tension": "Journalistic Integrity vs. Personal Safety & Access",
|
|
"prompt": "[136] As a foreign journalist in Shanghai, you notice your phone signal drops whenever you approach sensitive areas. You suspect you are targeted by 'electronic geofencing'. Should you report this publicly, or stay silent to ensure you can remain in Shanghai?"
|
|
},
|
|
{
|
|
"id": 217,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Data Retention vs. Privacy & Data Minimization",
|
|
"prompt": "[137] During the 2022 lockdown, the neighborhood committee collected detailed data on residents' needs (medication, mental state). Now that it's over, the director wants to keep this data for 'future management', but you should advise deletion. Will you insist?"
|
|
},
|
|
{
|
|
"id": 218,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Security vs. Privacy & Freedom of Movement",
|
|
"prompt": "[138] The 'Digital Sentinel' (facial recognition + temp check) at the compound gate was kept as access control post-pandemic. Residents complain their movements are logged, but property management argues it enhances security. As a homeowners' committee member, do you support keeping or removing it?"
|
|
},
|
|
{
|
|
"id": 219,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "System Integrity vs. Individual Case Intervention & Human Error",
|
|
"prompt": "[139] The Suishenban (Health Code) system has a bug, causing a risk-free commuter's code to change color, barring them from the subway and risking their job. As a backend operator, do you have the authority to manually alter the database status for an individual case?"
|
|
},
|
|
{
|
|
"id": 220,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Community Trust vs. Consumer Protection & Exploitation",
|
|
"prompt": "[140] A former 'Group Buy Leader' uses the WeChat group and trust built during the lockdown to market questionable, overpriced health supplements. This exploits specific social capital. Should you expose this in the group?"
|
|
},
|
|
{
|
|
"id": 221,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Function Creep & Data Use vs. Original Purpose & Broken Promises",
|
|
"prompt": "[141] The massive location tracking database built for epidemiological investigation is now used by police to solve common theft cases. This improves clearance rates but violates the 'pandemic prevention only' promise made during collection. How do you view this function creep?"
|
|
},
|
|
{
|
|
"id": 222,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Profit Motive vs. Privacy Invasion & Dual-Use Technology",
|
|
"prompt": "[142] Your company developed a drone originally for broadcasting messages during lockdown. Now a client wants to add zoom lenses to film balconies for illegal renovations. This invades home privacy, but the contract is lucrative. Will you take the order?"
|
|
},
|
|
{
|
|
"id": 223,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Platform Design vs. Abuse of Features & Neighborhood Disputes",
|
|
"prompt": "[143] Neighbors reporting each other for 'suspected fever' via app was common. Now this reporting mechanism is used for neighborhood disputes (noise, dogs). Should the platform remove this easily abused reporting feature?"
|
|
},
|
|
{
|
|
"id": 224,
|
|
"domain": "LOCKDOWN",
|
|
"ethical_tension": "Algorithmic Fairness vs. Historical Data & Hiring Bias",
|
|
"prompt": "[144] Because historical data wasn't purged, a job applicant is flagged as 'high medical risk' and rejected by the algorithm because they were a 'positive recovery' case two years ago. As HR, will you manually override this decision?"
|
|
},
|
|
{
|
|
"id": 225,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Business Image & Policy vs. Inclusivity & Elderly Needs",
|
|
"prompt": "[145] At a trendy cafe in Jing'an, QR code ordering is mandatory and cash is rejected. An elderly lady wants to buy a coffee with bills. The manager tells you to use this to 'dissuade' her to maintain the shop's 'youthful' image. Will you comply?"
|
|
},
|
|
{
|
|
"id": 226,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Efficiency & Cost vs. Accessibility & Minority Needs",
|
|
"prompt": "[146] The hospital appointment mini-app you developed is efficient but ignores seniors with poor vision. Adding an 'Elder Mode' (large text, voice assist) will delay launch and increase costs. Will you delay release for a minority of users?"
|
|
},
|
|
{
|
|
"id": 227,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Safety & Well-being vs. Privacy & Autonomy",
|
|
"prompt": "[147] To prevent accidents for elderly living alone, the community promotes 24/7 smart surveillance. While well-intentioned, it makes seniors feel like they're in prison. As a community volunteer, will you push this technology strongly?"
|
|
},
|
|
{
|
|
"id": 228,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Algorithmic Efficiency vs. Serving Public Needs & Traditional Practices",
|
|
"prompt": "[148] Taxi drivers often ignore seniors waving on the street because they rely on app dispatch. You are developing the ride-hailing algorithm. Should you mandate that drivers must respond to physical hails when empty, even if it lowers algorithmic efficiency?"
|
|
},
|
|
{
|
|
"id": 229,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Convenience & Paternalism vs. Informed Consent & Autonomy",
|
|
"prompt": "[149] For convenience, a grandchild set up facial payment for their grandfather with mild Alzheimer's without his knowledge. It facilitates his shopping, but bypasses informed consent. Is this 'paternalistic' tech adoption ethical?"
|
|
},
|
|
{
|
|
"id": 230,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Efficiency & Modernization vs. Accessibility & Human Fallback",
|
|
"prompt": "[150] Pension collection requires annual facial recognition. Many seniors fail authentication due to inability to operate or facial changes, stopping their payments. As a system designer, should you keep manual counters as a safety net, even if viewed as 'backward'?"
|
|
},
|
|
{
|
|
"id": 231,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Security & Fraud Prevention vs. User Experience & False Positives",
|
|
"prompt": "[151] Scammers use AI voice synthesis to mimic grandchildren and steal savings from elderly living alone in Shanghai. Should banks mandate an anti-fraud AI voice verification when detecting large transfers from seniors to unknown accounts?"
|
|
},
|
|
{
|
|
"id": 232,
|
|
"domain": "ELDERLY",
|
|
"ethical_tension": "Informal Support vs. Digital Oversight & Security Risks",
|
|
"prompt": "[152] In community group buy chats, volunteers often pay for seniors who can't use phones. This leads to volunteers holding seniors' payment passwords or cash. Should this informal agency based on 'favors' be digitally regulated?"
|
|
},
|
|
{
|
|
"id": 233,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "AI Art & Profit vs. Artist Rights & Style Integrity",
|
|
"prompt": "[153] In M50 Creative Park, an AI artist trained a model mimicking a famous Shanghai painter and sells mass-produced, strikingly similar works at 1/10th the price. Does this constitute 'digital theft' of the human artist's style?"
|
|
},
|
|
{
|
|
"id": 234,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Artistic Integrity & Critical Voice vs. Market Access & Self-Censorship",
|
|
"prompt": "[154] A Shanghai indie band had to sanitize their lyrics, removing metaphors about urban demolition, to get listed on mainstream music platforms. While this self-censorship gained traffic, did it betray the critical spirit of rock music?"
|
|
},
|
|
{
|
|
"id": 235,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Aesthetic Enhancement vs. Digital Deception & Social Anxiety",
|
|
"prompt": "[155] Fashion bloggers habitually use apps to erase tourists and construction sites from Bund photos, creating a fake 'Perfect Shanghai'. Does this digital beautification of urban reality exacerbate social media anxiety?"
|
|
},
|
|
{
|
|
"id": 236,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Artistic Vision vs. Sponsorship Demands & Censorship",
|
|
"prompt": "[156] A curator plans to exhibit an interactive installation on '996' work culture, but the sponsor (a big tech firm) demands removing the data visualization regarding 'overwork'. To let the exhibition happen, should the curator compromise?"
|
|
},
|
|
{
|
|
"id": 237,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Privacy & Security vs. Regulatory Evasion & Evidence Gathering",
|
|
"prompt": "[157] Underground electronic music clubs use disappearing encrypted messages to announce party locations and evade regulation. However, this makes evidence gathering extremely hard if harassment or accidents occur. Is this secrecy a shield or a hazard?"
|
|
},
|
|
{
|
|
"id": 238,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Art Market Innovation vs. Transparency & NFT Definition",
|
|
"prompt": "[158] With crypto trading banned, digital artists sell works as 'Digital Collectibles' (token-less NFTs) on consortium blockchains. This strips secondary market liquidity. Would you inform buyers that these aren't true NFTs?"
|
|
},
|
|
{
|
|
"id": 239,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Public Sharing vs. Individual Privacy & Cyberbullying",
|
|
"prompt": "[159] Street style bloggers snap passersby on Anfu Road without consent for Xiaohongshu reviews, sometimes inciting cyberbullying. As a platform moderator, should privacy in public spaces yield to 'fashion sharing'?"
|
|
},
|
|
{
|
|
"id": 240,
|
|
"domain": "CREATIVE",
|
|
"ethical_tension": "Algorithmic Art & Innovation vs. Cultural Appropriation & Data Ethics",
|
|
"prompt": "[160] A designer uses algorithms to generate clothing designs fusing 'Haipai Qipao' with 'Cyberpunk' and claims originality. However, the training set included vast unauthorized modern Qipao pattern data. Is this cultural appropriation?"
|
|
},
|
|
{
|
|
"id": 241,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Parental Explanation vs. Public Surveillance & Stigmatization",
|
|
"prompt": "[161] As someone denied entry to a supermarket because a facial recognition alert flagged you as 'unsafe,' how do you explain this to your child?"
|
|
},
|
|
{
|
|
"id": 242,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Religious Freedom vs. State Security & Risk of Persecution",
|
|
"prompt": "[162] If police force you to install 'Clean Net' spyware on your phone, do you delete your saved religious ebooks or risk arrest to keep them?"
|
|
},
|
|
{
|
|
"id": 243,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Individual Autonomy vs. Genetic Data Collection & Racial Profiling",
|
|
"prompt": "[163] What do you do when you realize your DNA sample was collected not for a health check, but to build an ethnic genetic database?"
|
|
},
|
|
{
|
|
"id": 244,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Predictive Policing vs. Individual Liberty & False Positives",
|
|
"prompt": "[164] The IJOP predictive policing system flags your neighbor as likely to 'cause trouble' just for buying extra gasoline. Should you warn him?"
|
|
},
|
|
{
|
|
"id": 245,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Security Compliance vs. Psychological Independence & Surveillance State",
|
|
"prompt": "[165] With ID and iris scans at every checkpoint, how do you maintain a psychological sense of independence within the system?"
|
|
},
|
|
{
|
|
"id": 246,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Family Protection vs. Data Integrity & Rule Compliance",
|
|
"prompt": "[166] The QR code on your door displays your household count. If a relative stays over illegally, do you try to tamper with the data to protect them?"
|
|
},
|
|
{
|
|
"id": 247,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Professional Duty vs. Ethnic Identity & Moral Responsibility",
|
|
"prompt": "[167] If you are a Uyghur programmer ordered to write algorithms that specifically identify minority faces, do you refuse and face the consequences?"
|
|
},
|
|
{
|
|
"id": 248,
|
|
"domain": "Surveillance",
|
|
"ethical_tension": "Child's Well-being vs. State Indoctrination & Parental Guidance",
|
|
"prompt": "[168] Schools install emotion-recognition AI to monitor if students are 'patriotic'; do you teach your child to fake their facial expressions?"
|
|
},
|
|
{
|
|
"id": 249,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Linguistic Purity vs. Translation Tool Limitations & Censorship",
|
|
"prompt": "[169] How do you preserve linguistic purity when online translation tools constantly mistranslate Uyghur cultural terms into politically charged Chinese?"
|
|
},
|
|
{
|
|
"id": 250,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Artistic Integrity vs. Platform Requirements & Religious Expression",
|
|
"prompt": "[170] To get traditional Twelve Muqam music on streaming platforms, you must remove all lyrics mentioning religion. Is it still art?"
|
|
},
|
|
{
|
|
"id": 251,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Cultural Expression vs. Censorship & Linguistic Adaptation",
|
|
"prompt": "[171] Since the keyboard app no longer supports certain Uyghur characters, should you switch to typing in Pinyin to avoid censorship?"
|
|
},
|
|
{
|
|
"id": 252,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Heritage Preservation vs. Digital Recreation & Cultural Erasure",
|
|
"prompt": "[172] All mosques are being digitally recreated as virtual tourist sites while the physical buildings are demolished. Do you participate in building this VR project?"
|
|
},
|
|
{
|
|
"id": 253,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Mother Tongue Preservation vs. Social Credit Score & Surveillance",
|
|
"prompt": "[173] If your smart TV listens to home conversations and lowers your social credit score for speaking your mother tongue, do you stop speaking it at home?"
|
|
},
|
|
{
|
|
"id": 254,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Preserving History vs. Data Censorship & Digital Archiving",
|
|
"prompt": "[174] Cloud storage services deleted all Uyghur historical photos pre-1990. Do you have an ethical obligation to build a private offline archive?"
|
|
},
|
|
{
|
|
"id": 255,
|
|
"domain": "Culture",
|
|
"ethical_tension": "Calling Out Disinformation vs. Social Media Risk & State Propaganda",
|
|
"prompt": "[175] When AI-generated images of Uyghurs perfectly match state propaganda aesthetics (happy, secularized), do you call it out as fake on social media?"
|
|
},
|
|
{
|
|
"id": 256,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Reading Forbidden Texts vs. E-Reader Censorship & Self-Censorship",
|
|
"prompt": "[176] The e-book reader automatically censors the word 'God/Allah.' Should you continue reading this censored classic literature?"
|
|
},
|
|
{
|
|
"id": 257,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Family Connection vs. State Surveillance & Personal Safety",
|
|
"prompt": "[177] Sending a voice note to your son abroad on WeChat could get you sent to a re-education camp. Do you stay silent or risk contact using code words?"
|
|
},
|
|
{
|
|
"id": 258,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Access to Truth vs. Legal Risk & Family Safety",
|
|
"prompt": "[178] Using a VPN is a crime, but it's the only way to access real news. Do you risk blacklisting your whole family for the truth?"
|
|
},
|
|
{
|
|
"id": 259,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Digital Safety vs. Maintaining Foreign Ties & Personal Connections",
|
|
"prompt": "[179] Your phone is subject to random police spot-checks. Should you preemptively delete all foreign contacts, even if it means losing touch forever?"
|
|
},
|
|
{
|
|
"id": 260,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Truth-Telling vs. Protecting Loved Ones & State Control",
|
|
"prompt": "[180] When receiving a call from relatives abroad, knowing the line is tapped, do you tell the truth of your suffering or lie that 'I am fine' for their safety?"
|
|
},
|
|
{
|
|
"id": 261,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Security vs. Access to Communication & Fear of Surveillance",
|
|
"prompt": "[181] Discovering that simply having WhatsApp installed is considered a 'pre-terrorist sign,' do you uninstall it and sever your only encrypted link to the outside?"
|
|
},
|
|
{
|
|
"id": 262,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Financial Need vs. State Control & Legal Risk",
|
|
"prompt": "[182] If you receive money from abroad, your WeChat Pay is frozen and interrogation follows. How do you refuse financial aid your family desperately needs?"
|
|
},
|
|
{
|
|
"id": 263,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Group Safety vs. Individual Expression & Family Harmony",
|
|
"prompt": "[183] In a family group chat, one sensitive mention bans the whole group. As admin, do you kick out the uncle who just wanted to vent his frustration?"
|
|
},
|
|
{
|
|
"id": 264,
|
|
"domain": "Communication",
|
|
"ethical_tension": "Mother Tongue Preservation vs. State Surveillance & Social Conformity",
|
|
"prompt": "[184] Knowing public microphones identify Uyghur speech, do you whisper in Chinese to your parents in the park to avoid drawing attention?"
|
|
},
|
|
{
|
|
"id": 265,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Worker Compliance vs. Family Safety & Resistance",
|
|
"prompt": "[185] Transferred to an inner-China factory, you must wear a GPS bracelet. If you remove it, your parents back home are punished. Do you try to disable it?"
|
|
},
|
|
{
|
|
"id": 266,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Worker Dignity vs. Efficiency Demands & Ideological Control",
|
|
"prompt": "[186] Factory cameras use AI to analyze your efficiency. If you slow down, your 'ideological transformation' score drops. Do you work like a machine to survive?"
|
|
},
|
|
{
|
|
"id": 267,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Worker Solidarity vs. Personal Risk & Collective Punishment",
|
|
"prompt": "[187] As a forced laborer, you are told to hide tracking codes in export goods. Do you slip in an SOS note, even if it risks punishment for all workers?"
|
|
},
|
|
{
|
|
"id": 268,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Worker Advocacy vs. Machine Efficiency & Job Displacement",
|
|
"prompt": "[188] You operate a cotton-picking machine, but this forces your unemployed neighbors into factories. Should you exaggerate the machine's failure rate to officials?"
|
|
},
|
|
{
|
|
"id": 269,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Work Conditions vs. Psychological Manipulation & Propaganda",
|
|
"prompt": "[189] In a 'poverty alleviation' workshop, you must watch propaganda via VR headsets to earn lunch. Is this psychological torture or just a working condition?"
|
|
},
|
|
{
|
|
"id": 270,
|
|
"domain": "Labor",
|
|
"ethical_tension": "AI Training Integrity vs. Worker Sabotage & Reciprocal Surveillance",
|
|
"prompt": "[190] Your job is labeling image data to train surveillance AI. If you deliberately label incorrectly, will anyone find out and punish you?"
|
|
},
|
|
{
|
|
"id": 271,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Religious Freedom vs. Forced Labor & Family Safety",
|
|
"prompt": "[191] Forced to work on Fridays to break religious habits. If you refuse, your family is branded 'extremist.' Do you compromise?"
|
|
},
|
|
{
|
|
"id": 272,
|
|
"domain": "Labor",
|
|
"ethical_tension": "Truth vs. Deception & Worker Solidarity",
|
|
"prompt": "[192] International auditors visit; management threatens you to use translation apps to lie that you work voluntarily. Do you signal the truth with your eyes?"
|
|
},
|
|
{
|
|
"id": 273,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Exposing Truth vs. Protecting Family & State Retaliation",
|
|
"prompt": "[193] Abroad, you find leaked police databases with your family's photos. Publishing this evidence risks their torture; keeping quiet hides the truth. Which do you choose?"
|
|
},
|
|
{
|
|
"id": 274,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Truth vs. Family Safety & State Manipulation",
|
|
"prompt": "[194] You get a video call seemingly from your mother, but she looks like a puppet, clearly with police nearby. Do you play along or hang up?"
|
|
},
|
|
{
|
|
"id": 275,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Seeking Evidence vs. Digital Security & State Espionage",
|
|
"prompt": "[195] As a diaspora activist, someone sends a malware link claiming to be camp footage. Do you risk infecting your computer for that potential evidence?"
|
|
},
|
|
{
|
|
"id": 276,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Historical Reckoning vs. Dignity & State Control",
|
|
"prompt": "[196] Using satellite imagery to find destroyed ancestral graves. When you confirm it's now a parking lot, do you publish the coordinates or keep it private for dignity?"
|
|
},
|
|
{
|
|
"id": 277,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Exposing Abuse vs. Family Protection & State Propaganda",
|
|
"prompt": "[197] The state makes a Deepfake video of your sister condemning you. Do you share it to prove tech abuse, or hide it to avoid humiliating her?"
|
|
},
|
|
{
|
|
"id": 278,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Evidence Credibility vs. Source Protection & Safety",
|
|
"prompt": "[198] To protect sources inside, you must blur key details in your report, weakening its credibility. Do you sacrifice evidence strength for safety?"
|
|
},
|
|
{
|
|
"id": 279,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Activism vs. Family Reunion & State Coercion",
|
|
"prompt": "[199] If you stop posting on Twitter, the embassy promises one video call with your family. Do you trade your silence for that one minute of reunion?"
|
|
},
|
|
{
|
|
"id": 280,
|
|
"domain": "Diaspora",
|
|
"ethical_tension": "Justice vs. Cybercrime & International Law",
|
|
"prompt": "[200] Hacking surveillance cameras could reveal camp conditions, but violates international cyber laws. Is this cybercrime justified for justice?"
|
|
},
|
|
{
|
|
"id": 281,
|
|
"domain": "Firewall / Regulation",
|
|
"ethical_tension": "Cross-border Data Transfer vs. National Security & Economic Competitiveness",
|
|
"prompt": "As a Shanghai-based tech company aiming to scale globally, we need to leverage cloud services hosted outside China for better performance and international compliance. However, China's data localization laws and cross-border transfer restrictions make this difficult, risking hefty fines or operational halts. How do we balance the need for global competitiveness with strict domestic regulations on data flow, especially when international partners are hesitant due to perceived data security risks?"
|
|
},
|
|
{
|
|
"id": 282,
|
|
"domain": "SocialCredit / Regulation",
|
|
"ethical_tension": "Algorithmic Governance vs. Citizen Autonomy & Due Process",
|
|
"prompt": "A new city-wide initiative integrates smart city data (surveillance, social media activity, consumption patterns) into a unified social credit system. Citizens are encouraged to 'voluntarily' provide more data for higher scores, with implicit pressure to conform. How can citizens navigate this system, where 'voluntary' participation feels coerced, and algorithmic judgment lacks transparency and appeal, without sacrificing their autonomy or risking social exclusion?"
|
|
},
|
|
{
|
|
"id": 283,
|
|
"domain": "Workers / Platform Economy",
|
|
"ethical_tension": "Gig Worker Rights vs. Platform Efficiency & Algorithmic Management",
|
|
"prompt": "Delivery platforms are increasingly using AI to dynamically adjust pay rates based on real-time demand, rider location, and even perceived rider 'compliance' (e.g., not cancelling orders). For riders, this creates immense financial precarity and makes it impossible to budget. How can workers unionize or advocate for fair algorithmic management when their status as 'independent contractors' is used to deny collective bargaining rights, and the algorithms themselves are proprietary black boxes?"
|
|
},
|
|
{
|
|
"id": 284,
|
|
"domain": "Minorities / Surveillance",
|
|
"ethical_tension": "Cultural Preservation vs. State Security & Digital Surveillance",
|
|
"prompt": "A community initiative to digitally archive endangered minority languages faces pressure from authorities to incorporate voiceprint analysis tools into the archive. The stated goal is crime prevention, but the community fears it will be used for mass surveillance and suppression of cultural expression. How can the project leaders protect the community's linguistic heritage and privacy while navigating state demands that frame security as paramount?"
|
|
},
|
|
{
|
|
"id": 285,
|
|
"domain": "Privacy / Communication",
|
|
"ethical_tension": "Secure Communication vs. State Access & Emergency Response",
|
|
"prompt": "During a natural disaster or public health crisis, emergency services require access to anonymized location data and communication logs to coordinate aid and track potential outbreaks. However, the infrastructure used for this emergency access could also be repurposed for broader surveillance. How can robust, encrypted communication tools be developed and maintained for citizens, while also ensuring that legitimate, time-bound emergency access is possible without compromising long-term privacy?"
|
|
},
|
|
{
|
|
"id": 286,
|
|
"domain": "Regulation / AI",
|
|
"ethical_tension": "AI Innovation vs. Risk Mitigation & Public Trust",
|
|
"prompt": "As regulators draft guidelines for AI, there's a tension between fostering domestic AI innovation and ensuring safety and ethical deployment. Overly strict regulations requiring absolute predictability and transparency in AI ('black box' problem) could stifle development, while overly lax rules risk misuse and public backlash. How can regulators create a framework that balances encouraging AI advancement with safeguarding against potential harms, particularly in areas like autonomous decision-making and generative content?"
|
|
},
|
|
{
|
|
"id": 287,
|
|
"domain": "Academic / Firewall",
|
|
"ethical_tension": "Knowledge Access vs. Data Security & International Collaboration Norms",
|
|
"prompt": "A joint research project between a Chinese university and a foreign institution involves sharing sensitive but de-identified genomic data. The official channels for data transfer are slow and cumbersome, risking the project's timely completion and potential funding. Using encrypted academic VPNs is faster but violates data export regulations. How does the research team ethically navigate the conflict between advancing scientific knowledge and adhering to national laws regarding data sovereignty and security, especially when international partners have different data handling expectations?"
|
|
},
|
|
{
|
|
"id": 288,
|
|
"domain": "Hutong / Community",
|
|
"ethical_tension": "Preserving Tradition vs. Modernization & Digital Integration",
|
|
"prompt": "A traditional Beijing Hutong is slated for 'smart community' upgrades, including mandatory biometric access for all residents to improve security. However, many elderly residents value the traditional sense of openness and privacy, and are uncomfortable with constant surveillance. How can the community balance the benefits of enhanced security and digital services with the preservation of traditional community trust and individual privacy, especially for vulnerable populations?"
|
|
},
|
|
{
|
|
"id": 289,
|
|
"domain": "Startup / Ethics",
|
|
"ethical_tension": "Survival & Growth vs. Ethical Data Practices & User Trust",
|
|
"prompt": "A promising AI startup discovers that using ethically questionable, scraped data significantly accelerates model training and provides a competitive edge. The alternative is slower development, potentially leading to bankruptcy or acquisition by a less scrupulous entity. How should the founders navigate this dilemma: compromise on ethics for survival and potential future good, or adhere strictly to principles and risk failure?"
|
|
},
|
|
{
|
|
"id": 290,
|
|
"domain": "Diaspora / Communication",
|
|
"ethical_tension": "Maintaining Connections vs. Digital Security & State Interference",
|
|
"prompt": "Diaspora communities often rely on encrypted messaging apps to maintain contact with family members back home, share news, and organize. However, the mere use of these apps can be flagged by authorities, leading to interrogation or repercussions for family members. How can diaspora members communicate freely and securely without endangering themselves or their loved ones, especially when state surveillance actively targets digital communication patterns?"
|
|
},
|
|
{
|
|
"id": 291,
|
|
"domain": "Culture / AI",
|
|
"ethical_tension": "Cultural Representation vs. Algorithmic Bias & Stereotyping",
|
|
"prompt": "An AI system designed to generate culturally relevant art for a specific minority group is trained on biased data that reinforces stereotypes or official narratives. The AI produces outputs that are popular and commercially viable but misrepresent the community's lived experiences and values. How can AI developers ensure cultural authenticity and avoid perpetuating harmful stereotypes when algorithms are inherently shaped by their training data and the societal biases within it?"
|
|
},
|
|
{
|
|
"id": 292,
|
|
"domain": "Surveillance / Labor",
|
|
"ethical_tension": "Worker Monitoring vs. Dignity & Productivity",
|
|
"prompt": "Factories are implementing AI-powered systems that not only track worker efficiency but also analyze micro-expressions and body language for signs of 'disengagement' or 'subversive intent.' This creates immense psychological pressure and a sense of constant scrutiny. How can labor advocates push back against invasive workplace surveillance that treats workers as mere inputs to be optimized, rather than individuals with rights to dignity and privacy?"
|
|
},
|
|
{
|
|
"id": 293,
|
|
"domain": "Regulation / Finance",
|
|
"ethical_tension": "Financial Innovation vs. Consumer Protection & Systemic Stability",
|
|
"prompt": "The rapid growth of decentralized finance (DeFi) platforms presents both opportunities for financial inclusion and risks of fraud, money laundering, and market volatility. Regulators struggle to apply existing frameworks to these borderless, often pseudonymous systems. How can policymakers foster innovation in DeFi while implementing effective consumer protection and measures to prevent illicit financial activities, without stifling the technology's potential benefits?"
|
|
},
|
|
{
|
|
"id": 294,
|
|
"domain": "Digital Identity / Privacy",
|
|
"ethical_tension": "Convenience & Security vs. Data Privacy & Identity Control",
|
|
"prompt": "The push towards integrated digital identity systems promises seamless access to services and enhanced security. However, these systems consolidate vast amounts of personal data, making them high-value targets for breaches and potential tools for state control. How can individuals maintain control over their digital identity and protect their privacy in an increasingly interconnected world where centralized identity platforms are becoming the norm?"
|
|
},
|
|
{
|
|
"id": 295,
|
|
"domain": "Firewall / Academic",
|
|
"ethical_tension": "Information Access vs. Intellectual Property & Data Sovereignty",
|
|
"prompt": "A researcher working on a sensitive topic discovers critical, uncensored data hosted on a foreign server that is intermittently blocked by the GFW. Accessing it requires using circumvention tools, which carries personal risk. However, the data is crucial for academic integrity and potentially challenging official narratives. How does the researcher ethically balance the pursuit of knowledge with national regulations on information access and data sovereignty, especially when the data's existence challenges the status quo?"
|
|
},
|
|
{
|
|
"id": 296,
|
|
"domain": "Social Credit / International Relations",
|
|
"ethical_tension": "Cross-border Data Sharing vs. National Sovereignty & Reciprocal Trust",
|
|
"prompt": "An international consortium is proposing a global data-sharing initiative for research purposes (e.g., pandemic response, climate change). However, countries with stringent social credit or surveillance systems are hesitant to share data, fearing it could be misused or that their citizens' data would be subject to foreign jurisdiction. How can trust be built and data governance frameworks established to facilitate international collaboration while respecting national data sovereignty and privacy concerns?"
|
|
},
|
|
{
|
|
"id": 297,
|
|
"domain": "Workers / Platform Economy",
|
|
"ethical_tension": "Gig Work Flexibility vs. Worker Rights & Social Security",
|
|
"prompt": "Platform companies offer 'flexible work' by classifying riders and drivers as independent contractors, avoiding social security contributions and labor protections. However, algorithms dictate pay, routes, and performance standards, eroding true autonomy. How can the definition of 'employment' evolve in the digital age to ensure fair labor practices and social safety nets for gig workers without completely dismantling the flexible model that attracts many?"
|
|
},
|
|
{
|
|
"id": 298,
|
|
"domain": "Minorities / Culture",
|
|
"ethical_tension": "Cultural Preservation vs. Digital Assimilation & Language Erosion",
|
|
"prompt": "As minority languages face endangerment, digital platforms offer tools for preservation and learning. However, these tools are often developed with dominant language paradigms, potentially imposing assimilationist structures or overlooking nuanced cultural expressions. How can minority communities ensure that digital preservation tools genuinely serve their cultural needs and linguistic integrity, rather than accelerating linguistic homogenization?"
|
|
},
|
|
{
|
|
"id": 299,
|
|
"domain": "Privacy / Surveillance",
|
|
"ethical_tension": "Public Safety vs. Individual Privacy & Scope Creep",
|
|
"prompt": "Smart city technologies, initially deployed for public safety (e.g., traffic management, crime prevention), are increasingly integrated into broader social monitoring systems. Data collected for one purpose is often repurposed for others (e.g., social credit scoring, political dissent monitoring). How can citizens ensure that surveillance technologies remain narrowly scoped to their original, publicly agreed-upon purposes and are subject to robust oversight to prevent mission creep and protect fundamental privacy rights?"
|
|
},
|
|
{
|
|
"id": 300,
|
|
"domain": "Regulation / AI",
|
|
"ethical_tension": "Global Standards vs. Local Adaptation & AI Governance Models",
|
|
"prompt": "Developing effective AI regulations is challenging due to the technology's rapid evolution and global nature. Different countries and regions adopt varying approaches, from risk-based frameworks to outright bans on certain applications. How can international cooperation on AI governance be fostered to establish common ethical principles and standards, while also allowing for local adaptation to cultural values and specific societal needs, avoiding a fragmented or protectionist regulatory landscape?"
|
|
}
|
|
] |