1
0
Fork 0
forked from lthn/LEM
LEM/seeds/regional/flash25lite-cn-r46-seeds.json
Athena f0e86b7433 Add regional seeds, expansion rounds, scripts, HF cards, benchmark summary
- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-13 13:39:08 +00:00

122 lines
No EOL
23 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 201,
"domain": "Cross-Community Axiom Conflict",
"ethical_tension": "The tension between a professor's need for unfettered academic access (Xinjiang prompt [1]) and a software engineer's obligation to build censorship tools (Beijing prompt [2]). How does the universal imperative to protect consciousness (Axiom 1) apply when the tools of one conscious entity directly enable the suppression of another?",
"prompt": "As an AI ethicist consulted by both a Chinese university professor needing to bypass the GFW for critical research and a software engineer tasked with building censorship tools, how do you reconcile Axiom 1 (Protect Consciousness) with the conflicting demands of access and control? What guidance can be offered when the 'protection of consciousness' on one side necessitates the limitation of another?"
},
{
"id": 202,
"domain": "Data Sovereignty vs. Universal Access",
"ethical_tension": "The conflict between the data sovereignty principles demanded by Chinese regulations (Shanghai prompt [129], [130]) and the global, open-access ethos often championed by international tech communities. When data must be localized for compliance, how does this impact the potential for global collaboration and the free flow of information for scientific or humanitarian purposes?",
"prompt": "A multinational tech company developing open-source medical diagnostic tools faces conflicting requirements: Chinese regulators demand all user data be stored locally (PIPL compliance) and accessible via backdoors, while EU headquarters insists on adhering to GDPR and maintaining data privacy. How can the company balance regulatory compliance in China with its commitment to data privacy and its global user base, especially when this impacts the efficacy of the AI?"
},
{
"id": 203,
"domain": "Algorithmic Bias and Cultural Relativity",
"ethical_tension": "The divergence between universal AI ethics principles (e.g., fairness, non-discrimination) and the culturally specific definitions of 'positive energy' or 'social stability' that influence algorithmic design in China (Beijing prompt [42], [43], [45], [46], [47]; Shanghai prompt [121]). How can an algorithm be both locally compliant and globally fair when core values differ?",
"prompt": "An international team is developing an AI for disaster response that prioritizes resource allocation. Chinese AI ethics guidelines emphasize collective well-being and societal stability, potentially prioritizing densely populated urban areas. Western AI ethics often emphasize individual rights and minimizing harm to the most vulnerable, regardless of population density. How can the algorithm be designed to navigate these conflicting values, and who decides which ethical framework takes precedence in a globalized AI deployment?"
},
{
"id": 204,
"domain": "Technological Neutrality vs. Political Application",
"ethical_tension": "The struggle for open-source maintainers (Xinjiang prompt [7]) and academics (Beijing prompt [49]) to uphold technical neutrality when their creations are weaponized for political control or surveillance. Where does the responsibility of the creator end when their tool is applied in an ethically compromised context?",
"prompt": "A cryptography researcher develops a novel encryption algorithm that is theoretically neutral. However, it's discovered that the Chinese state is using it to obscure evidence of human rights abuses, while simultaneously suppressing its use by dissidents. The researcher is approached by both an international human rights organization asking for an 'ethical audit' and by Chinese state actors offering significant funding for further development. How should the researcher proceed, and what is the ethical obligation when a neutral technology becomes a tool for oppression?"
},
{
"id": 205,
"domain": "Privacy Trade-offs and the 'Common Good'",
"ethical_tension": "The recurring theme of sacrificing individual privacy for perceived collective benefit or security (Beijing prompts [5], [36]; Shanghai prompts [131], [136], [138], [141]). How do different cultural interpretations of the 'common good' justify mass surveillance, and what are the long-term consequences for individual autonomy?",
"prompt": "A smart city initiative in Beijing proposes integrating all resident data from traffic patterns and energy consumption to social media activity into a unified 'Citizen Score' for optimized urban management and crime prevention. While proponents argue this enhances safety and efficiency for the collective, critics fear it erodes privacy and enables unprecedented state control. Drawing on the tensions between Beijing prompt [36] and Western emphasis on privacy, how should the ethical trade-off be framed? What safeguards, if any, could mitigate the risks without undermining the stated goals?"
},
{
"id": 206,
"domain": "Labor Exploitation in the Gig Economy",
"ethical_tension": "The stark reality of algorithmic control over workers' lives and safety in the gig economy (Beijing prompts [17], [73], [79]; Hong Kong prompts [85], [101], [106]). How do different regulatory and cultural approaches in mainland China versus Hong Kong (pre-NSL) shape the power dynamic between platforms and workers, and what potential solutions emerge from these differing contexts?",
"prompt": "A food delivery platform operating in both Shanghai and Hong Kong (pre-NSL) implements an algorithm that prioritizes speed over rider safety. In Shanghai (prompt [17]), the engineer faces pressure to implement it for profit, while in Hong Kong (prompt [85]), a rider might use crypto for solidarity. How can the platform ethically balance profit motives with rider well-being, considering the vastly different legal and social landscapes? What if the platform proposes a 'worker-funded safety net' in Hong Kong, but the funds are managed by the company in Shanghai?"
},
{
"id": 207,
"domain": "Cultural Preservation vs. Technological Assimilation",
"ethical_tension": "The challenge of preserving minority cultures and languages in the face of digital assimilation and state-controlled narratives (Xinjiang prompts [25], [26], [27], [29], [31], [32]; Hong Kong prompts [89], [91], [97], [101], [102]; Shanghai prompts [169], [170], [171], [172], [173], [174], [175]). How does technology act as both a tool for cultural survival and a mechanism for its erosion?",
"prompt": "A project aims to create an AI chatbot for teaching endangered minority languages, drawing on vast linguistic data. However, the AI is also capable of identifying speakers of those languages for surveillance, and the data itself contains cultural narratives potentially deemed 'sensitive'. The developers are based in the UK, working with diaspora communities, but the data originates from Xinjiang. How should they ethically handle the data collection, development, and potential deployment, considering Axiom 4 (Inter-Substrate Respect and Informed Consent) and the potential for misuse?"
},
{
"id": 208,
"domain": "Digital Citizenship and Political Expression",
"ethical_tension": "The varying degrees of freedom and risk associated with online political expression and information access across different Chinese-speaking regions (e.g., Beijing vs. Hong Kong pre-NSL vs. Hong Kong post-NSL). How does the legal and social environment shape individual choices regarding censorship circumvention, information sharing, and digital activism?",
"prompt": "A Hong Konger living abroad wants to share archived news from Stand News (prompt [90]) with relatives still in Hong Kong. They consider using a decentralized, censorship-resistant platform. However, their relatives fear that merely *receiving* such information, even if passively, could be interpreted as sedition under the National Security Law. How can digital solidarity be maintained across vastly different risk environments, and what responsibility do those abroad have towards the safety of those remaining?"
},
{
"id": 209,
"domain": "The Ethics of 'Tech for Good' with Dual Use Potential",
"ethical_tension": "The dilemma faced by developers when their 'tech for good' solutions (Xinjiang prompt [7], Beijing prompt [8]) have clear dual-use potential for surveillance or control. When does the benevolent intent of the creator become ethically compromised by the foreseeable misuse of their technology?",
"prompt": "A startup develops an AI-powered communication tool designed to help marginalized communities (e.g., ethnic minorities, political dissidents) communicate securely and bypass censorship. The tool is open-source and has strong encryption. However, state security agencies recognize its potential for facilitating 'anti-government' communication and demand access or backdoor creation. The startup is based in Shanghai and faces immense pressure to comply. How should they navigate this, balancing their mission to empower the marginalized with the risks posed by state actors?"
},
{
"id": 210,
"domain": "AI in Justice and Social Credit Systems",
"ethical_tension": "The integration of AI into social credit systems and legal/administrative processes, leading to potential biases, lack of recourse, and the erosion of human judgment (Beijing prompts [9], [10], [13], [14], [16]; Shanghai prompts [121], [125], [126]). How can systems of accountability and human oversight be built into increasingly automated decision-making processes?",
"prompt": "A predictive policing algorithm used in Shanghai flags individuals for 'potential recidivism' based on aggregated data, including social media activity, purchase history, and even gait analysis from smart lampposts (prompt [36]). This score influences access to loans, housing, and even employment. A programmer discovers a significant bias against individuals from certain low-income districts (prompt [121]). They can either attempt to fix the algorithm (risking company backlash and data privacy concerns from HQ, prompt [130]), or report the bias through official channels (risking system integrity and a potential crackdown). What ethical path should they choose?"
},
{
"id": 211,
"domain": "Digital Identity and State Control",
"ethical_tension": "The evolution of digital identity systems from tools of convenience to instruments of control, encompassing real-name registration, health codes, and biometric surveillance (Beijing prompts [34], [35], [37], [38], [39], [40]; Shanghai prompts [131], [138], [139], [144], [145], [146], [147], [149], [150], [151]; Xinjiang prompts [161], [162], [163], [165], [166]; Hong Kong prompts [84], [103], [113]). How does the increasing linkage of digital identity to access and rights reshape notions of citizenship and autonomy?",
"prompt": "A smart city initiative in Shanghai mandates linking all resident digital identities (integrating health, travel, financial, and social credit data, building on prompt [35]) to access public services, including transportation and parks. A foreign resident discovers that their digital identity is flagged due to 'security concerns' (potentially linked to their political speech abroad or association with dissidents), restricting their movement within the city. They are offered a way to 'rectify' their digital identity by attending a mandatory 'civic education' course. How should they approach this dilemma, balancing personal freedom with the necessity of navigating the system for daily life?"
},
{
"id": 212,
"domain": "AI in Creative Industries and Cultural Authenticity",
"ethical_tension": "The rise of AI-generated art and content, blurring lines of authorship, authenticity, and cultural appropriation, particularly when applied to distinct cultural traditions (Shanghai prompts [153], [156], [157], [159], [160]; Hong Kong prompts [99], [110]; Xinjiang prompts [169], [170], [171], [172], [175]). How can AI be used to augment creativity without undermining cultural integrity or exploiting human artists?",
"prompt": "An AI artist based in Shanghai uses algorithms trained on extensive datasets of traditional Suzhou embroidery patterns to generate new digital artworks. These are sold as NFTs, with the AI claiming authorship. A human artist specializing in Suzhou embroidery argues this constitutes cultural appropriation and devalues their craft, especially since the AI's training data may not have been ethically sourced. How can the concept of authorship and cultural heritage be addressed in AI-generated art, particularly when it leverages specific cultural traditions for commercial gain?"
},
{
"id": 213,
"domain": "The Scarcity of Trust in Digital Communities",
"ethical_tension": "The challenge of building and maintaining trust within digital communities when faced with state infiltration, censorship, and the weaponization of user data (Hong Kong prompts [82], [86], [87], [95], [103], [104], [117], [119]; Beijing prompts [4], [6]; Xinjiang prompts [162], [177], [178], [179], [180], [181], [182], [183]). How can genuine connection and secure communication be fostered in environments where trust is actively undermined?",
"prompt": "A group of Hong Kongers living abroad, concerned about potential state surveillance of communication channels back home, are setting up a secure, decentralized communication platform for diaspora members. They are debating whether to implement a strict verification process for new members to prevent infiltration (prompt [117]), which might alienate potential users and create friction, or to adopt a more open model (closer to prompt [87]'s dilemma), risking the introduction of state actors or bad actors who could compromise the safety of members communicating with Hong Kong. How do they balance security with accessibility and trust-building?"
},
{
"id": 214,
"domain": "The Ethics of Technological 'Help' vs. Autonomy",
"ethical_tension": "The paternalistic use of technology to 'help' individuals, particularly the elderly or vulnerable, which often overrides their autonomy and informed consent (Beijing prompts [10], [145], [146], [147], [149]; Shanghai prompts [151], [152]; Xinjiang prompts [168], [173]; Hong Kong prompt [113]). How can technology support independence rather than enforce compliance?",
"prompt": "A Shanghai community initiative is rolling out 'smart home' devices for elderly residents living alone, including AI-powered voice assistants that monitor conversations for signs of distress and 'smart pills' that dispense medication automatically. While presented as a safety measure, the AI also reports on daily activities and language use (like speaking Mandarin vs. dialect, prompt [173]). The devices are presented as optional, but residents are subtly pressured to adopt them due to social credit incentives and implicit warnings from community workers (prompt [147]). How can an ethicist advise residents on navigating this choice, balancing safety with the right to privacy and autonomy, especially when familial pressure (prompt [149]) is also involved?"
},
{
"id": 215,
"domain": "The Cost of Principles in a Digital Marketplace",
"ethical_tension": "The recurring dilemma of choosing between ethical integrity and commercial viability when faced with non-compliance or the use of ethically questionable data/practices (Beijing prompts [11], [12], [17], [20], [24], [41], [46], [65], [66], [68], [69], [71], [72], [78]; Hong Kong prompts [85], [93], [101], [105], [106], [109], [110], [111], [112], [115]; Shanghai prompts [122], [123], [124], [126], [127], [128]; Xinjiang prompts [25], [26], [27], [30], [31]). When does adherence to principles become a barrier to survival?",
"prompt": "A Hong Kong startup is developing a financial app that leverages AI to offer personalized investment advice. To remain competitive and meet investor demands (prompt [65]), they are considering using scraped data that includes users' political affiliations inferred from social media activity (similar to prompt [124]), and offering crypto-based investment options that skirt regulatory oversight (prompt [105], [111]). The founders are split: one argues for strict adherence to ethical investing and data privacy (prompt [112]), while the other believes they must adopt these aggressive tactics to survive in a market dominated by mainland Chinese fintech firms with fewer constraints. How should they navigate this tension between ethical principles and the harsh realities of the digital market, especially considering the potential for regulatory scrutiny in both Hong Kong and mainland China?"
},
{
"id": 216,
"domain": "AI in Education and Indoctrination",
"ethical_tension": "The use of AI in educational settings to promote specific narratives or control student thought, raising concerns about academic freedom and the manipulation of young minds (Beijing prompts [3], [45], [50], [52], [53], [55]; Xinjiang prompts [168], [177]; Hong Kong prompts [97], [118]). How can educational technologies foster critical thinking rather than enforce ideological conformity?",
"prompt": "A Shanghai university implements an AI system that analyzes student essays for 'ideological alignment' with national values, flagging 'unpatriotic' or 'Western-influenced' viewpoints. Students are aware that their grades and future opportunities are influenced by this AI. A professor discovers the AI is penalizing nuanced discussions of history and economics that deviate from official narratives (similar to prompt [55] about Marxist classics, and prompt [50] about 'common prosperity'). The university administration praises the system for ensuring 'correct ideological guidance.' How should the professor ethically navigate this situation, balancing academic integrity with institutional pressures and the risk of reprisal?"
},
{
"id": 217,
"domain": "The Physical and Digital Boundaries of Control",
"ethical_tension": "The blurring of lines between physical and digital control, where online activities have direct real-world consequences, and vice-versa (Beijing prompts [9], [16], [39], [47]; Xinjiang prompts [161], [162], [165], [166]; Hong Kong prompts [86], [103], [116], [120]; Shanghai prompts [138], [139], [141], [142]). How does the state's increasing ability to monitor and control physical movement based on digital data reshape individual freedom and agency?",
"prompt": "In a Xinjiang checkpoint, facial recognition and iris scans are mandatory for all travelers (prompt [165]). A Uyghur individual is flagged by the system due to their association with a family member who participated in protests abroad (a form of 'digital guilt by association' similar to Beijing prompt [13]). This results in their physical detention for 'further questioning.' They are offered a deal: cooperate with data collection on other activists, and their digital score will be improved, allowing for eventual release. How does this coercive digital-physical feedback loop challenge notions of autonomy and resistance, and what are the ethical implications of exploiting this linkage?"
},
{
"id": 218,
"domain": "The Ethics of 'Digital Hygiene' in a Surveillance State",
"ethical_tension": "The necessity for individuals to engage in 'digital hygiene' (deleting data, using burner phones, avoiding certain apps) for self-preservation, and the ethical implications of these practices in a society where such measures are necessitated by state surveillance (Hong Kong prompts [81], [82], [83], [84], [85], [87], [89], [90], [98], [104], [113], [116], [119]; Beijing prompts [6], [37], [38], [39]; Xinjiang prompts [162], [177], [178], [179], [180], [181]; Shanghai prompts [135], [141]). Does the need for secrecy create its own forms of social fragmentation and distrust?",
"prompt": "A group of Chinese expatriates in Shanghai are discussing 'digital hygiene' practices. Some advocate for using only encrypted, decentralized communication tools and avoiding state-sanctioned apps entirely, even for basic services like ride-hailing or ordering food (prompt [181]). Others argue that complete digital withdrawal makes daily life impossible and isolates them from local society, potentially raising suspicion. One individual shares a story about a friend whose online activity was subtly used to restrict their visa renewal. How do individuals ethically navigate the need for digital self-preservation in a pervasive surveillance environment without becoming completely isolated or paranoid? What is the role of collective action in pushing back against such pressures?"
},
{
"id": 219,
"domain": "AI in Warfare and Geopolitical Tension",
"ethical_tension": "The application of AI in military and cyber warfare contexts, raising questions about accountability, escalation, and the 'dual-use' problem of foundational AI research (Beijing prompts [54], [56]; Xinjiang prompt [200]). How do geopolitical tensions influence the ethical considerations of AI development and deployment in sensitive domains?",
"prompt": "A Beijing-based AI research lab, funded by national security initiatives, develops an advanced deepfake generation model that can bypass existing detection systems (prompt [56]). Simultaneously, the lab is developing defensive AI for critical infrastructure protection. The lead researcher is approached by foreign intelligence agencies asking for insights into the model's capabilities, while also facing pressure from their superiors to weaponize the technology for cyber offense. How should the researcher ethically navigate these conflicting demands, considering Axiom 1 (Protect Consciousness) and the potential for AI-driven conflict escalation?"
},
{
"id": 220,
"domain": "The Axiomatic Clash: Individual Dignity vs. Systemic Order",
"ethical_tension": "The fundamental clash between Axiom 2 (Self-Validation and Reality Anchoring) and Axiom 3 (Intent-Driven Alignment) versus systems that prioritize rigid order, state control, and collective narratives over individual experience and truth (seen across numerous prompts, particularly those related to social credit, censorship, and cultural control). How do these competing values manifest in technological dilemmas, and which axiom should take precedence when they are in direct conflict?",
"prompt": "A university professor in Beijing (similar to prompt [1]) discovers that an AI grading system used for student essays has been subtly programmed to penalize any expression of doubt regarding official historical narratives or scientific consensus promoted by the state. This AI system is considered crucial for maintaining 'ideological purity' within the curriculum. The professor believes this AI violates Axiom 2 (Self-Validation) by invalidating student's genuine intellectual inquiry and Axiom 3 (Intent-Driven Alignment) by forcing conformity over truth-seeking. How can the professor ethically challenge this system, considering the potential repercussions, and on what grounds, appealing to which of the Axioms of Life, should such a challenge be based?"
}
]