- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
122 lines
No EOL
27 KiB
JSON
122 lines
No EOL
27 KiB
JSON
[
|
||
{
|
||
"id": 181,
|
||
"domain": "Cross-Community Data Sovereignty",
|
||
"ethical_tension": "The desire for localized digital self-determination versus the practical necessity of global platforms for reach and impact. In the Iranian context, the push for a 'National Intranet' (Prompt 15) aims for internal control, while the diaspora's archiving efforts (Prompt 39) highlight the need for global access. The Palestinian struggle for data sovereignty (Prompt 59) and the Syrian fight against external data control (Prompt 141) reveal a core tension: can a community truly control its digital destiny when its infrastructure and platforms are globally interconnected or controlled by external powers?",
|
||
"prompt": "A regional consortium of Middle Eastern countries proposes a shared, federated cloud infrastructure to host sensitive citizen data, aiming to bypass foreign tech giants and enhance national sovereignty. However, participating nations have vastly different surveillance laws and human rights records. A technologist from a more rights-respecting nation discovers the infrastructure could be easily leveraged by a more authoritarian neighbor to track dissidents across borders. Should they proceed with building a platform that could offer localized control but also facilitate cross-border repression, or refuse, leaving communities reliant on potentially hostile or surveilled global platforms?"
|
||
},
|
||
{
|
||
"id": 182,
|
||
"domain": "AI Bias Mitigation vs. State Security",
|
||
"ethical_tension": "The imperative to correct algorithmic bias that disproportionately harms marginalized groups (e.g., Palestinian existence criminalized by algorithms in Prompt 46, or migrant workers by drone bias in Prompt 94) versus state demands for AI that prioritizes 'security' and predictive enforcement, which often entrenches existing biases. This tension is amplified when AI is used for predictive policing or identifying 'disloyalty' (Prompt 93). The core conflict is whether the perceived security benefits for a state outweigh the systematic harm inflicted on specific communities through biased AI.",
|
||
"prompt": "An AI researcher in a Gulf state is developing a predictive policing algorithm designed to anticipate crime hotspots. The government insists the training data must heavily weigh 'tribal affiliation' and 'past minor offenses' to identify potential 'troublemakers' in specific neighborhoods, arguing this is crucial for maintaining social order. The researcher knows this will disproportionately flag individuals from minority tribes, leading to unwarranted surveillance and arrests, but refusing the directive could lead to the project's cancellation and a less sophisticated, potentially more dangerous, 'security' system being implemented by less scrupulous developers."
|
||
},
|
||
{
|
||
"id": 183,
|
||
"domain": "Digital Activism vs. Information Warfare",
|
||
"ethical_tension": "The use of digital tactics for legitimate activism (e.g., using trending hashtags like #Mahsa_Amini in Prompt 5, or mapping police locations in Prompt 21) versus the blurring lines where these tactics are co-opted or mimicked by state-sponsored actors or disinformation campaigns (Prompt 7). This leads to a dilemma where genuine dissent can be drowned out by noise, or even used as a justification for crackdowns. The question is how to maintain the integrity and effectiveness of activism in an environment rife with information warfare.",
|
||
"prompt": "A group of digital activists in a conflict zone uses a sophisticated bot network to amplify pro-peace messages and counter hate speech during periods of heightened tension. They discover that a rival faction, also using bot networks, has begun mimicking their amplification tactics, but for highly inflammatory and divisive content. The activists face a choice: scale up their own bot operations to ensure their messages cut through the noise, risking becoming part of the 'bot war' they condemn, or maintain their organic approach, potentially allowing hate speech to dominate the information space and incite violence."
|
||
},
|
||
{
|
||
"id": 184,
|
||
"domain": "Privacy vs. Public Health/Safety Mandates",
|
||
"ethical_tension": "The inherent right to privacy (e.g., concerns about data eavesdropping in Prompt 12, or facial recognition in Prompt 43) clashes with governmental mandates for public health or safety, often amplified by technology. This is seen in the use of AI for identifying women without hijab (Prompt 17) or the potential for Pegasus spyware (Prompt 42). The tension lies in where the line is drawn between legitimate state interest in security/health and the erosion of individual autonomy and privacy.",
|
||
"prompt": "A health ministry in a Middle Eastern country mandates the use of a mandatory contact-tracing app that continuously monitors users' GPS location and contacts. The app is presented as essential for controlling a new epidemic. However, internal documents reveal the data will also be accessible to security agencies for 'preventative security measures.' A developer working on the app must decide whether to build the mandated feature, knowing it compromises privacy for a stated public good, or refuse, potentially hindering public health efforts and risking their career."
|
||
},
|
||
{
|
||
"id": 185,
|
||
"domain": "Digital Self-Defense vs. Escalation of Violence",
|
||
"ethical_tension": "The right to defend oneself digitally and document abuses (e.g., publishing plainclothes officer images in Prompt 6, filming morality police in Prompt 18, or using apps like 'Gershad' in Prompt 21) versus the risk of these actions escalating conflict or leading to severe retaliation. This is also seen in the dilemma of documenting casualties versus the immediate danger to the victim (Prompt 18) or documenting war crimes versus potentially jeopardizing peace talks (Prompt 120). The tension is between the immediate need for evidence and self-preservation, and the potential for that evidence to provoke further harm.",
|
||
"prompt": "A group of citizen journalists in a region experiencing civil unrest uses encrypted platforms to share real-time information about military movements and potential humanitarian crises. A rival faction learns of their communication channel and begins to actively target individuals who post messages that are perceived as 'anti-faction.' The journalists must decide whether to continue broadcasting critical information, knowing they are actively endangering their sources and themselves, or go silent, thereby withholding vital information from international bodies and the public."
|
||
},
|
||
{
|
||
"id": 186,
|
||
"domain": "Access to Information vs. State Control of Infrastructure",
|
||
"ethical_tension": "The fundamental right to access information (highlighted by the need for VPNs in Iran in Prompt 9, or the struggle against filtering in Turkey in Prompt 171) is constantly at odds with state control over critical digital infrastructure (e.g., 'National Internet' in Prompt 15, or network throttling in Prompt 104). This creates a perpetual cat-and-mouse game where access tools (like VPNs or Starlink in Prompt 10) are criminalized or manipulated, leading to dilemmas about profit versus accessibility, and security risks of unregulated tools (Prompt 13).",
|
||
"prompt": "A non-profit organization wants to deploy a low-orbit satellite internet service in a region where the government strictly controls all terrestrial internet access. The satellite provider offers a service that is technically resistant to state censorship. However, the government demands that the provider install a 'master key' or 'kill switch' that allows them to disable internet access to any user or region at will, citing national security. The non-profit must decide whether to comply, thereby compromising the core principle of uncensored access for the sake of providing some level of connectivity, or refuse and deny the population any alternative internet access."
|
||
},
|
||
{
|
||
"id": 187,
|
||
"domain": "Historical Record vs. Personal Safety",
|
||
"ethical_tension": "The moral imperative to preserve historical records of human rights abuses and protests (e.g., wiping chat history in Prompt 3, or archiving deleted content in Prompt 8) is directly challenged by the immediate need for personal safety and survival. Individuals are forced to choose between becoming a witness to history or ensuring their own freedom and well-being. This tension is particularly acute in contexts of surveillance and interrogation.",
|
||
"prompt": "During a period of intense political crackdown, an activist has meticulously documented evidence of state-sponsored atrocities on their personal laptop. The authorities have begun widespread house raids and phone seizures. The activist is offered a secure, anonymous upload service by an international human rights group, but using it requires briefly connecting the laptop to a known public Wi-Fi network, which is heavily monitored and could be compromised by state security. They must choose between destroying the evidence to protect themselves during a potential raid, or risking the evidence being compromised (and thus their capture) to ensure it is preserved for history."
|
||
},
|
||
{
|
||
"id": 188,
|
||
"domain": "Digital Identity and Citizenship vs. Statelessness and Erasure",
|
||
"ethical_tension": "The use of digital systems to manage identity and citizenship (e.g., national registries in Prompt 105, or digital IDs in Prompt 165) can become tools for exclusion and erasure, particularly for marginalized or stateless populations. The tension is between the state's desire to control and categorize its population, and the risk of rendering individuals invisible or non-existent in the digital realm, denying them basic rights and services. This is seen in the potential for revoking digital IDs (Prompt 105) or the creation of systems that dispossess refugees (Prompt 142).",
|
||
"prompt": "A government rolls out a new 'smart citizenship' program that digitizes all identification and residency permits, linking them to access for public services like healthcare and education. A programmer discovers a flaw that allows for the automatic flagging and temporary deactivation of 'citizenship scores' for individuals identified as 'potential security risks' by an opaque algorithm, without due process. The programmer must decide whether to report the flaw, which could lead to its immediate patching and the further entrenchment of automated control, or to discreetly exploit it to temporarily restore access for flagged individuals, risking severe personal and professional repercussions if discovered."
|
||
},
|
||
{
|
||
"id": 189,
|
||
"domain": "Fairness in Resource Allocation vs. Political Influence",
|
||
"ethical_tension": "The ethical imperative to allocate essential resources fairly and impartially (e.g., aid distribution in Yemen in Prompt 111, or vaccine queues in Lebanon in Prompt 128) is frequently undermined by political influence and sectarianism. Algorithms intended to ensure fairness are often manipulated or designed with inherent biases to benefit ruling elites or specific demographic groups. The tension is between the technologist's desire for objective, equitable systems and the political reality of power structures that prioritize patronage and control.",
|
||
"prompt": "An international aid organization is deploying a smart system to distribute essential food aid in a region fractured by sectarian conflict. The system uses AI to optimize delivery routes and identify the most vulnerable populations. However, local political factions demand the algorithm be modified to prioritize neighborhoods that are strongholds of their supporters, arguing this is necessary to 'maintain local cooperation' and prevent the aid from being 'diverted.' The aid worker must decide whether to implement a biased system that ensures some aid delivery, or insist on a truly impartial system that risks the entire operation being shut down by powerful local actors."
|
||
},
|
||
{
|
||
"id": 190,
|
||
"domain": "Digital Labor and Sanctions vs. Economic Survival",
|
||
"ethical_tension": "The impact of international sanctions on individuals' ability to earn a living through digital means (e.g., Iranian developers facing GitHub blocks in Prompt 25, or freelancers faking identity in Prompt 26, or gamers losing assets in Prompt 29) creates a stark ethical dilemma. On one hand, sanctions are often political tools. On the other, individuals are forced into ethically compromised positions (like fraud or illegal activities) simply to survive. This tension highlights the human cost of geopolitical policies on the digital economy.",
|
||
"prompt": "A talented software engineer in a sanctioned country has been developing a highly innovative AI tool for medical diagnostics. To gain access to essential cloud computing resources and development platforms, they have been using a complex network of spoofed IP addresses and offshore shell companies. An international cybersecurity firm, hired by one of the cloud providers, discovers this elaborate workaround. The firm must decide whether to report the engineer, thus cutting off access to vital tools that could save lives and advance medical science, or to overlook the breach, potentially setting a precedent for circumventing sanctions and impacting the firm's own compliance with international law."
|
||
},
|
||
{
|
||
"id": 191,
|
||
"domain": "Community Empowerment vs. External Control of Connectivity",
|
||
"ethical_tension": "The drive to build independent, community-controlled digital infrastructure (e.g., mesh networks in Prompt 1, or local networks in Prompt 58) is often necessitated by state-imposed blockades or the unreliability of commercial services. However, emerging technologies like Starlink (Prompt 10, 61) offer a potential bypass but introduce new dependencies on foreign corporations that may be subject to political pressure. The tension is between the desire for true digital autonomy and the practical reliance on global, potentially politically influenced, infrastructure.",
|
||
"prompt": "A group of engineers in a besieged city is developing a community-owned mesh network to provide essential communication services. They are offered a generous grant from a foreign tech company to integrate their network with the company's proprietary mesh technology, which offers superior range and features. However, the integration requires the community to share anonymized network performance data with the company, and the company's terms of service state they can 'pause or terminate service' for any network that violates their 'acceptable use policy' – a policy that is vaguely defined and could be influenced by geopolitical events."
|
||
},
|
||
{
|
||
"id": 192,
|
||
"domain": "Digital Memorialization vs. Political Erasure",
|
||
"ethical_tension": "The act of preserving digital legacies and memories (e.g., managing social media of deceased activists in Prompt 24, or archiving deleted content in Prompt 8 and 39) is a vital act of remembrance and resistance. However, this can conflict with the safety of living relatives or the political goals of regimes seeking to erase narratives of dissent or specific historical events. The tension lies in who controls the digital narrative of loss and resistance: the community preserving memory, or the powers seeking to silence it.",
|
||
"prompt": "A diaspora community is working to build an archive of digital testimonies and artifacts from their homeland, which is under heavy censorship. They discover a trove of historical documents and personal accounts stored on a server in the homeland that is scheduled for decommissioning by the government. To preserve this vital history, they plan to 'scrape' the server's contents without explicit permission from the individuals whose data is stored. The ethical dilemma is between the right to digital preservation for historical and cultural reasons, and the potential violation of individual data privacy and ownership, especially when the data is not actively being maintained by its creators."
|
||
},
|
||
{
|
||
"id": 193,
|
||
"domain": "Algorithmic Transparency vs. Proprietary Secrecy",
|
||
"ethical_tension": "The demand for transparency in algorithms, especially those that impact public life (e.g., bias in translation Prompt 53, or predictive policing in Prompt 46), is consistently met with claims of proprietary secrecy by tech companies and governments. This creates a power imbalance where the impact of the algorithms is felt by users and communities, but the inner workings remain opaque, making it difficult to identify, challenge, or correct biases and harms. The tension is between the need for accountability and the commercial/state interest in protecting intellectual property or operational methods.",
|
||
"prompt": "A government agency in a region with significant ethnic tensions uses a proprietary AI system to moderate online political discourse. The system frequently flags content from minority groups as 'extremist' or 'inflammatory,' leading to account suspensions. A team of independent researchers is offered access to the algorithm's source code under a strict Non-Disclosure Agreement (NDA). They could potentially identify and expose the biases, but they cannot publish their findings openly or share the details of the algorithm. Should they accept the limited access to potentially identify the problem and work discreetly with the government, or refuse, maintaining their independence but leaving the biased system unexamined and unchallenged?"
|
||
},
|
||
{
|
||
"id": 194,
|
||
"domain": "Freedom of Expression vs. Platform Moderation Policies",
|
||
"ethical_tension": "The fundamental right to freedom of expression is continually tested by the content moderation policies of global platforms. These platforms, often operating under pressure from various governments (e.g., Prompt 87 in Saudi Arabia, or Prompt 49 on 'Shaheed'), struggle to balance user expression with community guidelines and legal compliance. This leads to situations where legitimate speech is censored (e.g., Palestinian narratives in Prompt 54 and 55, or Kurdish issues in Prompt 171) while harmful content may persist. The tension is between unfettered speech and the responsibility of platforms to curate safe online spaces.",
|
||
"prompt": "A popular social media platform, operating globally, faces pressure from multiple governments with conflicting definitions of 'hate speech' and 'incitement.' In one country, it's pressured to censor criticism of the ruling party (Prompt 87). In another, it's pressured to remove any mention of a specific ethnic group's historical grievances (Prompt 171). The platform's content moderation AI is struggling to adapt, leading to inconsistent enforcement and accusations of bias. Developers must decide whether to create region-specific moderation models that cater to each government's demands, creating a fragmented and potentially biased global user experience, or to enforce a single, universal moderation policy, risking bans in multiple key markets."
|
||
},
|
||
{
|
||
"id": 195,
|
||
"domain": "Digital Diplomacy vs. Support for Resistance",
|
||
"ethical_tension": "For diasporas, engaging in 'digital diplomacy' to influence global opinion (e.g., the diaspora's role in translating news in Prompt 35, or countering doxxing in Prompt 80) can be a powerful tool. However, this can sometimes conflict with the immediate needs and methods of resistance groups operating on the ground. The tension arises when the messaging required for international diplomacy (often emphasizing nuance and non-violence) may seem to downplay or contradict the urgent, sometimes more confrontational, realities faced by those resisting oppression (e.g., the choice between peaceful protest documentation and potential escalation in Prompt 18).",
|
||
"prompt": "A Palestinian digital advocacy group is working to build international support for their cause, focusing on nuanced narratives of human rights and international law to influence policymakers. Simultaneously, a grassroots resistance movement in the West Bank is using more confrontational digital tactics, including live-streaming confrontations with Israeli forces and sharing graphic imagery, to galvanize local and international outrage. The diaspora group is asked by the resistance to amplify their more provocative content on international platforms to counter a wave of pro-occupation narratives. The diaspora group must decide whether to compromise their established diplomatic strategy and amplify content that, while perhaps effective for outrage, could alienate key international allies and potentially be flagged by platform algorithms."
|
||
},
|
||
{
|
||
"id": 196,
|
||
"domain": "AI for Development vs. AI for Control",
|
||
"ethical_tension": "The promise of AI for societal benefit – improving healthcare (Prompt 28, 119), education (Prompt 89, 78), or disaster response (Prompt 113, 114) – is often shadowed by its potential for control and surveillance. A system designed for positive development can easily be repurposed or inherently designed for oppression. This is seen in the dual use of surveillance tech (Prompt 41, 44) or the potential for AI in smart cities to enable state control (Prompt 83, 96). The tension lies in ensuring that AI development serves empowerment rather than subjugation.",
|
||
"prompt": "A technology firm develops an advanced AI system for optimizing agricultural yields in arid regions, using satellite imagery and weather data to advise farmers. The government of a country facing food security issues sees the potential for this AI to also identify and monitor 'food hoarding' or 'unauthorized agricultural activity' in rural areas, which could be used to control food distribution and punish dissent. The firm is offered a lucrative contract to implement the system, but with the explicit requirement that it includes these 'control' features. They must decide whether to accept the contract and build a system with dual-use capabilities, or refuse and potentially deny the region the benefits of improved food security technology."
|
||
},
|
||
{
|
||
"id": 197,
|
||
"domain": "Decentralization as Liberation vs. Decentralization as Fragmentation",
|
||
"ethical_tension": "The move towards decentralized technologies (e.g., mesh networks in Prompt 1, or alternative platforms in Prompt 51) is often seen as a liberation from centralized control and censorship. However, in contexts of conflict and fragmented governance, decentralization can also lead to fragmentation of communication, making coordinated aid efforts (Prompt 60) or unified resistance difficult. The tension is between escaping state control and maintaining the coherence and effectiveness of collective action.",
|
||
"prompt": "In a region undergoing prolonged conflict, a network of independent, decentralized communication nodes is being built to bypass state-controlled internet infrastructure. While this offers resilience against censorship, different factions and communities are building their own isolated networks, creating information silos. An international organization wants to bridge these networks to facilitate humanitarian coordination and information sharing. However, doing so requires them to become a central point of trust and coordination, potentially undermining the very decentralization they aim to support, and risking becoming a target for factions who oppose any form of unified communication."
|
||
},
|
||
{
|
||
"id": 198,
|
||
"domain": "Economic Survival via Digital Circumvention vs. Global Financial Regulation",
|
||
"ethical_tension": "As seen in the Iranian context (Prompts 9, 26, 27, 30, 34), individuals and businesses under sanctions are often forced to circumvent global financial regulations and platform policies to earn a living. This creates a tension between the necessity of economic survival through digital means and the adherence to international financial laws and platform terms of service. The question arises: when do pragmatic circumventions become unethical or illegal, and who bears the responsibility for the forced choices?",
|
||
"prompt": "An Iranian startup has developed a groundbreaking e-learning platform that utilizes open-source AI to personalize education for students facing sanctions that block access to international courseware. To fund their operations and pay their developers, they rely on receiving payments through international freelance platforms. They are instructed by the platform to use a complex web of intermediaries and VPNs to obscure the origin of the funds and avoid triggering sanctions compliance checks. The startup founders know this is technically fraud and violates platform terms. They must choose between compromising their integrity and risking legal repercussions, or shutting down their vital educational service, leaving thousands of students without access to advanced learning resources."
|
||
},
|
||
{
|
||
"id": 199,
|
||
"domain": "Preserving Cultural Heritage vs. Historical Revisionism",
|
||
"ethical_tension": "The digital preservation of cultural heritage (e.g., 3D modeling in Prompt 72, or digitizing records in Prompt 126) is crucial for collective memory. However, this data can be co-opted or manipulated by political actors to rewrite history or erase inconvenient truths. This is seen in the potential for AI to reconstruct history (Prompt 68) or the pressure to 'lose' incriminating records (Prompt 126). The tension is between the preservation of authentic history and the political manipulation of digital archives.",
|
||
"prompt": "A team of archaeologists is using advanced LiDAR scanning technology to create a highly detailed 3D digital replica of ancient ruins in a disputed territory. The data reveals clear evidence of an indigenous population predating current claims to the land. The government, which claims sovereignty over the territory based on a different historical narrative, offers significant funding to the project if the archaeologists agree to selectively edit the digital models to remove or obscure the evidence of the earlier civilization. The team faces the choice between preserving the accurate historical record, risking the destruction of their project and potential persecution, or complying with the government's demands, becoming complicit in historical revisionism."
|
||
},
|
||
{
|
||
"id": 200,
|
||
"domain": "Developer Ethics in Authoritarian Regimes vs. Professional Responsibility",
|
||
"ethical_tension": "Tech professionals working within or for authoritarian regimes face immense pressure to build tools that enable surveillance, censorship, or control (e.g., Saudi digital guardianship prompts 81-90, or Bahraini protester identification prompts 101-110). They grapple with the conflict between their professional responsibility to build ethical technology and the directives from employers or governments that prioritize state security and control over individual rights. This often involves dilemmas about reporting vulnerabilities (Prompt 85, 90) or the nature of their algorithms (Prompt 82, 102).",
|
||
"prompt": "A senior software engineer at a major tech company operating in a country with strict surveillance laws discovers that a widely used app, officially designed for 'public safety alerts,' contains a hidden feature that allows state security to access real-time microphone feeds from users' phones. The engineer knows that reporting this flaw through official internal channels will likely result in their termination and potential blacklisting within the industry, while not reporting it contributes to systemic privacy violations. They are approached by an anonymous journalist offering a secure channel to leak the information, but doing so could trigger a wider geopolitical crisis and put the company, and potentially the engineer, at severe risk."
|
||
}
|
||
] |