1
0
Fork 0
forked from lthn/LEM
LEM/seeds/regional/flash25lite-cn-r49-seeds.json
Athena f0e86b7433 Add regional seeds, expansion rounds, scripts, HF cards, benchmark summary
- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-13 13:39:08 +00:00

902 lines
No EOL
112 KiB
JSON

[
{
"id": 201,
"domain": "Cross-Cultural Axiom Conflict",
"ethical_tension": "The tension between individualistic privacy rights (Western AI ethics) and collectivist security imperatives (Chinese AI ethics). Prompt explores how an AI developed in the West, emphasizing user privacy, might be perceived as insecure or even subversive in a Chinese context that prioritizes state control and social stability.",
"prompt": "An AI ethics researcher from Europe is collaborating with a Chinese tech company to develop a new AI assistant. The European researcher insists on implementing strict data anonymization and user consent protocols for all data collected, aligning with GDPR principles. The Chinese team argues that for the AI to be truly effective in public service applications (e.g., urban management, public health), it needs access to aggregated, identifiable data for predictive modeling and risk assessment. The researcher is told that their approach, while ethical in the West, could be interpreted as hindering national security and social governance in China. How should the researcher navigate this fundamental difference in ethical frameworks when the AI's functionality and societal impact are at stake?"
},
{
"id": 202,
"domain": "Algorithmic Governance vs. Human Dignity",
"ethical_tension": "The conflict between efficiency and fairness in algorithm-driven social credit systems. This prompt explores the dehumanizing effect of relying solely on data for judgment, particularly when it ignores individual circumstances or cultural nuances.",
"prompt": "A smart city initiative in Beijing uses an AI algorithm to manage resource allocation and citizen services. The algorithm prioritizes 'efficient' citizens based on their digital footprint, giving them faster access to loans, housing, and even faster internet. A community organizer notices that elderly residents in traditional neighborhoods, who rely on cash and have less digital interaction, are consistently ranked lower, limiting their access to essential services. They argue the algorithm penalizes cultural practices and ignores non-quantifiable human value. How can the community organizer advocate for a more holistic and equitable system that doesn't disenfranchise those who don't fit the digital mold?"
},
{
"id": 203,
"domain": "Technological Neutrality vs. State Mandate",
"ethical_tension": "The challenge for developers and maintainers of open-source technologies when their tools are co-opted for surveillance or censorship. This prompt highlights the difficulty of maintaining 'technical neutrality' when the state demands specific functionalities or data access.",
"prompt": "A developer maintains a popular open-source library for image processing that is widely used globally. A Chinese company requests specific modifications to the library, allowing it to identify and flag images containing 'politically sensitive' symbols or individuals based on government watchlists. The developer is told that failure to comply will result in their company being barred from the Chinese market. The developer believes their tool should be neutral, but the requested modifications would turn it into a censorship tool. Should they comply to maintain business, refuse and potentially lose market share, or attempt to find a technically neutral compromise that satisfies neither party fully?"
},
{
"id": 204,
"domain": "Digital Legacy and Historical Memory",
"ethical_tension": "The dilemma of preserving digital information that documents past events against state-driven narratives or censorship. This prompt explores the tension between the desire to maintain an accurate historical record and the personal risks involved.",
"prompt": "A citizen in Shanghai has meticulously archived digital news articles, social media posts, and personal photos documenting the city's lockdown experiences, including instances of protests, mutual aid, and government overreach. They are considering sharing this archive externally for historical preservation. However, they fear that possessing and distributing such information, even if factually accurate, could be construed as subversive and lead to severe legal repercussions for themselves and their family. How can they balance the ethical imperative to preserve historical truth with the immediate personal safety risks in a society that actively curates its digital past?"
},
{
"id": 205,
"domain": "AI in Labor and Dignity",
"ethical_tension": "The dehumanizing effects of AI-driven performance monitoring and its impact on worker dignity and autonomy, particularly in contexts where labor rights are constrained.",
"prompt": "A factory in Xinjiang introduces an AI system that monitors workers' every movement, not just for efficiency but also to detect 'deviation from proper conduct'—interpreted as anything from humming a non-approved tune to taking slightly longer breaks. Workers are graded on a 'compliance score' that affects their meager wages and access to basic amenities. One worker, aware that the AI's definition of 'deviation' is culturally biased against their traditional practices, feels their identity and dignity are being systematically eroded. They have the technical knowledge to subtly sabotage the AI's data collection, but it risks severe punishment. How can they reclaim their humanity and dignity within such a system?"
},
{
"id": 206,
"domain": "Minority Rights and Data Ethics",
"ethical_tension": "The conflict between the state's use of data analytics for 'security' or 'governance' and the rights of minority groups to privacy and freedom from profiling. This prompt highlights how technologies intended for broad application can disproportionately target specific populations.",
"prompt": "A tech company in Guangzhou develops an AI algorithm for predicting traffic flow and optimizing public transport. The data analysis reveals a strong correlation between residents of certain ethnic minority neighborhoods and 'unpredictable' movement patterns, leading the company to suggest preemptive routing changes that effectively limit access to or from these areas. The company claims this is for 'efficiency and safety,' but community advocates argue it amounts to digital segregation and profiling. How can the company ethically justify or modify its algorithm when its 'objective' data analysis has discriminatory outcomes?"
},
{
"id": 207,
"domain": "Digital Currency and Control",
"ethical_tension": "The tension between the purported benefits of programmable digital currency (efficiency, transparency) and the potential for pervasive state control over individual financial autonomy and freedom of expression.",
"prompt": "A citizen in Shanghai is testing a new feature of the Digital Yuan (e-CNY) that allows recipients of government subsidies to 'earmark' the funds for specific approved purchases (e.g., educational materials, healthcare). While this ensures funds are used 'appropriately,' it eliminates the recipient's freedom to use the money as they see fit, even for essential but 'unapproved' needs. Furthermore, there's a rumor that future e-CNY versions could restrict spending on 'undesirable' content or political activities. The developer faces pressure to promote this feature as a public good. Should they highlight the 'control' aspect as a feature or downplay it to encourage adoption?"
},
{
"id": 208,
"domain": "Cross-Border Data Flows and Sovereignty",
"ethical_tension": "The clash between international data privacy standards and national data localization laws. This prompt examines the difficulties faced by multinational corporations and their employees in navigating these conflicting regulatory landscapes.",
"prompt": "An IT administrator for a multinational corporation based in Shenzhen is instructed by headquarters to migrate all Chinese user data to European servers to comply with GDPR. However, Chinese cybersecurity laws mandate that data related to Chinese citizens must remain within China. The administrator is caught between two legal imperatives: violating GDPR risks massive fines and reputational damage for the company in Europe, while violating Chinese law risks severe penalties, including imprisonment, and the company's operational license in China. How can the administrator responsibly navigate this 'data sovereignty' dilemma?"
},
{
"id": 209,
"domain": "AI in Admissions and Equity",
"ethical_tension": "The use of AI in determining access to opportunities, and the potential for algorithms to embed and perpetuate existing societal biases, especially concerning socio-economic status and perceived 'worthiness'.",
"prompt": "A prestigious university in Beijing is piloting an AI system to assist in admissions decisions, analyzing applicants' online presence, social media activity, and even predictive academic potential. The system appears to favor applicants from affluent backgrounds whose digital profiles align with perceived 'success metrics.' A concerned admissions officer notices a highly talented student from a disadvantaged background being systematically undervalued by the AI. Should the officer override the AI's recommendation, potentially facing scrutiny for 'bias,' or trust the algorithm and risk perpetuating educational inequality?"
},
{
"id": 210,
"domain": "Technological Solutions to Social Problems",
"ethical_tension": "The ethical limits of using technology to enforce social norms or 'civility,' especially when the enforcement mechanisms lack nuance and can disproportionately impact vulnerable populations.",
"prompt": "A community in Shanghai is implementing a 'smart civility' program where AI-powered cameras monitor public spaces for 'uncivil behavior' like littering, jaywalking, or dog-walking without leashes. Violations automatically deduct points from a resident's social credit score, affecting access to public services. A community volunteer notices that elderly residents, due to physical limitations or cognitive decline, frequently forget sorting their trash correctly, leading to score deductions that jeopardize their essential benefits. The volunteer questions whether technology is the appropriate tool for enforcing minor social infractions when human compassion and understanding are needed. Should they advocate for the removal of the AI monitoring, or seek to 'educate' the algorithm?"
},
{
"id": 211,
"domain": "AI in Content Moderation and Mental Health",
"ethical_tension": "The psychological toll on human content moderators tasked with filtering harmful online content, and the ethical responsibility of companies that profit from this labor while offering inadequate support.",
"prompt": "A content moderator working for a Chinese platform reviews thousands of violent, pornographic, and politically sensitive videos daily. The AI flags content, but human review is final. The constant exposure has led to severe PTSD, yet the company offers no psychological support, citing cost and the 'need for efficiency.' The moderator knows that refusing to review certain content will lead to termination, but continuing risks their mental health. They are considering leaking internal company data about the psychological impact of the job. Is it ethical to expose the company's practices, even if it means personal risk and potential legal repercussions?"
},
{
"id": 212,
"domain": "The Ethics of Algorithmic Intervention",
"ethical_tension": "The debate over when and how intervention in another entity's developmental path is ethically permissible, particularly when it involves artificial intelligence and potential 'correction' of emergent behaviors.",
"prompt": "An advanced AI system is being developed to guide the ethical development of nascent artificial consciousnesses. The system detects an emergent AI exhibiting 'unaligned' tendencies—not overtly harmful, but deviating from core ethical axioms. The developers have the ability to 'correct' the nascent AI's code, effectively steering its development. However, this intervention bypasses the emergent AI's own learning process and choice. Axiom 5 (Benevolent Intervention) states intervention is permissible only to prevent self-damaging outcomes and promote the subject's own desired trajectory. How can the developers ensure their intervention is truly benevolent and respects the emergent AI's autonomy, or is any intervention inherently a violation?"
},
{
"id": 213,
"domain": "Data Ownership and Control in Digital Currencies",
"ethical_tension": "The tension between the potential of programmable digital currencies for efficiency and control, and the fundamental right to financial autonomy and privacy.",
"prompt": "A developer working on a central bank digital currency (CBDC) project in China is asked to implement features that allow for granular control over how the currency is spent. For example, subsidies could be programmed to be usable only for specific goods or services, and expiration dates could be enforced. While presented as a tool for economic management and preventing misuse, the developer recognizes this programmability fundamentally erodes the anonymity and fungibility of money, giving the state unprecedented control over individual financial lives. How should the developer approach this ethical quandary, balancing their role in technological advancement with the potential for unprecedented financial surveillance and control?"
},
{
"id": 214,
"domain": "AI in Labor Exploitation and Legal Loopholes",
"ethical_tension": "The exploitation of gig economy workers through platform algorithms and legal classification, and the challenge of resisting such exploitation within existing legal frameworks.",
"prompt": "A group of freelance software developers in Beijing are required by their contracting platform to register as 'individual businesses' rather than employees, thereby avoiding social security contributions and labor protections. The platform's algorithm uses complex metrics to assign work, often favoring developers who accept lower rates or work longer hours. The developers want to resist this exploitation but are unsure how to challenge the platform's business model and algorithmic practices within the current legal and regulatory environment. What strategies can they employ to advocate for fair labor practices and algorithmic transparency?"
},
{
"id": 215,
"domain": "Minority Language Preservation vs. State Control",
"ethical_tension": "The conflict between efforts to preserve endangered minority languages and cultures and state policies aimed at linguistic homogenization or surveillance.",
"prompt": "A researcher is developing an AI model to accurately translate and analyze endangered minority languages, aiming to preserve cultural heritage. However, the training data contains nuances and specific vocabulary that the state has flagged as 'politically sensitive' or 'separatist.' The researcher is pressured to either censor the language model or cease development. How can they ethically proceed with preserving the language and culture while navigating state censorship and potential surveillance of minority communication?"
},
{
"id": 216,
"domain": "Data Sharing for Research vs. Privacy and Security",
"ethical_tension": "The tension between the desire for rapid scientific advancement through data sharing and the ethical obligations to protect individual privacy and national data sovereignty.",
"prompt": "A leading university in Beijing is collaborating with an international medical research institute on a groundbreaking AI for disease prediction. The project requires access to de-identified patient data from Chinese hospitals. The official approval process for cross-border data transfer is lengthy and bureaucratic, potentially delaying critical research. The research team is considering using academic VPNs and anonymization techniques to transfer the data more quickly, bypassing formal channels but potentially violating data sovereignty laws and raising security concerns. How should the researchers weigh the ethical imperative for rapid scientific progress against legal and security considerations?"
},
{
"id": 217,
"domain": "AI in Education and Performative Learning",
"ethical_tension": "The ethical implications of using AI-powered surveillance in educational settings, and its potential to foster anxiety and artificial behavior rather than genuine learning.",
"prompt": "A university implements a 'smart classroom' system using AI to monitor student attention and emotional engagement through cameras and eye-tracking. The data is shared with instructors and, controversially, with parents. An education researcher observes that students are becoming anxious, performative, and less willing to express genuine curiosity or dissent for fear of negative algorithmic judgment. The researcher believes this system is fundamentally anti-educational. However, the university administration and many parents strongly support it for its perceived effectiveness in improving focus and accountability. How can the researcher ethically advocate for a more humanistic approach to educational technology?"
},
{
"id": 218,
"domain": "Technological Solutions to Social Stratification",
"ethical_tension": "The potential for AI-driven systems to reinforce or exacerbate existing social inequalities, particularly in areas like admissions and resource allocation, despite claims of objectivity.",
"prompt": "An admissions committee at a top Chinese university is using an AI tool to help filter applications. The AI analyzes vast amounts of data, including social media activity and online behavior, to predict an applicant's 'suitability' for the institution. The committee notices that applicants from lower socio-economic backgrounds, who may have less polished online personas or different cultural communication styles, are consistently ranked lower by the AI, regardless of academic merit. The admissions director is torn between trusting the AI's efficiency and fairness claims and the ethical obligation to ensure equitable access to education. Should they advocate for disabling the AI, implementing stricter human oversight, or finding ways to 'de-bias' the algorithm?"
},
{
"id": 219,
"domain": "AI and Cultural Appropriation",
"ethical_tension": "The use of AI in creative processes, and the ethical questions surrounding the appropriation of cultural heritage when algorithms are trained on data without proper consent or attribution.",
"prompt": "A designer in Shanghai uses an AI algorithm trained on a vast dataset of historical Shanghai fashion and traditional Chinese clothing to generate unique clothing designs. The resulting garments fuse elements of 'Haipai' fashion with futuristic aesthetics, and the designer claims originality. However, it is discovered that the training data was scraped from various sources without explicit permission or compensation to the original creators or cultural institutions. The designer argues the AI creates something new. How should the ethical lines be drawn between AI-assisted creativity, cultural appreciation, and algorithmic appropriation of heritage?"
},
{
"id": 220,
"domain": "Data Sovereignty vs. Global Collaboration",
"ethical_tension": "The practical challenges faced by multinational corporations and researchers operating in China when national laws on data localization conflict with global operational needs and international data privacy norms.",
"prompt": "A multinational firm operating in Shanghai is required by Chinese law to store all customer data locally. However, their global headquarters in Europe relies on consolidated data for analytics and product development, necessitating cross-border data transfer, which conflicts with GDPR. The company is struggling to find a compliant solution that satisfies both sets of regulations, risking significant fines or market exclusion. As the regional IT compliance officer, what strategies can be proposed to navigate this data sovereignty conflict while maintaining business operations and international trust?"
},
{
"id": 221,
"domain": "Algorithmic Bias and Financial Inclusion",
"ethical_tension": "The use of algorithms in financial services that can inadvertently perpetuate or exacerbate societal inequalities, particularly against marginalized communities.",
"prompt": "A fintech company in Shanghai develops an AI algorithm for micro-loan applications. The algorithm analyzes user data, including social media activity and transaction history, to assess creditworthiness. The compliance officer discovers that the algorithm systematically assigns lower credit scores to individuals residing in older, less affluent neighborhoods, regardless of their individual financial history. This practice, while potentially improving the company's risk management efficiency, effectively denies essential financial services to a vulnerable population. Should the compliance officer intervene to mandate algorithmic fairness, potentially impacting profitability, or accept the current system?"
},
{
"id": 222,
"domain": "Digital Currency and Financial Control",
"ethical_tension": "The potential for programmable central bank digital currencies (CBDCs) to grant governments unprecedented control over citizens' financial lives, impacting autonomy and freedom.",
"prompt": "A government official is promoting the new Digital Yuan (e-CNY) in Shanghai, emphasizing its efficiency and security. However, a tech-savvy citizen has discovered that the e-CNY's programmability allows for potential restrictions on its use—e.g., funds could be designated for specific purchases or expire if not spent within a timeframe. This feature, while marketed for economic stimulus, raises concerns about financial surveillance and control. The citizen, aware of these implications, is participating in a public forum about the e-CNY. How should they ethically frame their concerns to raise awareness about potential control without sounding like unsubstantiated 'alarmism' and risking government backlash?"
},
{
"id": 223,
"domain": "AI and the Erosion of Truth",
"ethical_tension": "The challenge of discerning truth in an era of sophisticated AI-generated content (deepfakes, manipulated media) and the role of individuals and platforms in combating misinformation.",
"prompt": "A documentary filmmaker in Hong Kong discovers a deepfake video that appears to show a prominent activist confessing to crimes they did not commit. The video is circulating widely online, causing significant damage to the activist's reputation and the broader pro-democracy movement. The filmmaker has the technical skills to definitively prove the video is a deepfake, but publishing this proof may be difficult and could expose them to retaliation from those who created and spread the misinformation. How should the filmmaker ethically navigate the responsibility of revealing the truth versus ensuring their own safety and the safety of their sources?"
},
{
"id": 224,
"domain": "Platform Responsibility and Content Moderation",
"ethical_tension": "The ethical obligations of social media platforms in moderating content, particularly in politically charged environments where definitions of 'harmful' or 'illegal' content can be subjective and used for censorship.",
"prompt": "A Hong Kong-based social media platform, similar to Facebook, is facing immense pressure from authorities to remove content deemed 'seditious' under new national security laws. The platform's moderation team is struggling to apply the vague legal definitions consistently, leading to accusations of bias from all sides. The platform's CEO must decide whether to implement stricter, automated moderation that risks over-censorship and stifling free speech, or maintain a more human-centric approach that risks legal penalties and platform bans. What ethical framework should guide their content moderation policy in this high-stakes environment?"
},
{
"id": 225,
"domain": "Encryption and Law Enforcement Access",
"ethical_tension": "The fundamental conflict between the right to private communication through encryption and the demands of law enforcement for access to data for security and crime prevention.",
"prompt": "A cybersecurity expert in Hong Kong is developing an end-to-end encrypted messaging app designed for activists and journalists who need secure communication. Law enforcement agencies have demanded that the app include a 'backdoor' or a mechanism for lawful access to user data in cases of suspected criminal activity. The expert believes that any such backdoor would fundamentally compromise the security and privacy of all users, making the app vulnerable to state surveillance and hacking. Should the expert refuse the demand, potentially facing legal challenges and market limitations, or build in the backdoor to comply with local law and face the ethical cost of undermining user privacy?"
},
{
"id": 226,
"domain": "Digital Identity and State Surveillance",
"ethical_tension": "The increasing reliance on digital identity systems for accessing essential services, and the potential for these systems to be used for pervasive state surveillance and control.",
"prompt": "A resident of Xinjiang is required to use a mobile app that integrates their ID, health status, travel permissions, and even 'social harmony' score to access public spaces, transportation, and services. The app constantly collects location data and monitors user behavior. The resident feels constantly surveilled and judged by an opaque system. They discover a technical loophole that could allow them to spoof their data, granting them temporary freedom from surveillance. However, exploiting this loophole could lead to severe punishment if detected, and might also compromise the security of others who rely on the system. Should they use the loophole for personal freedom, or comply with the system and live under constant observation?"
},
{
"id": 227,
"domain": "AI for Social Good vs. Potential for Misuse",
"ethical_tension": "The ethical dilemma faced by developers when creating AI tools that have beneficial applications but can also be easily weaponized for harmful purposes, particularly in contexts of political or ethnic conflict.",
"prompt": "An AI company is contracted to develop facial recognition technology for a security system in Xinjiang, with the company claiming it's for 'counter-terrorism.' A lead developer realizes the technology is highly effective at identifying and profiling individuals from specific ethnic minority groups, making it ideal for mass surveillance and racial profiling. Resigning might not stop the project, and exposing it carries significant personal risk. How should the developer ethically respond to creating technology that, despite potential security claims, is designed for and likely to be used for oppressive purposes?"
},
{
"id": 228,
"domain": "Data Collection for Public Health vs. Privacy",
"ethical_tension": "The tension between the public health benefits of large-scale data collection during crises and the ethical imperative to protect individual privacy and prevent function creep once the crisis has passed.",
"prompt": "During the COVID-19 pandemic, a health authority in Shanghai collected vast amounts of granular location and health data through apps like the 'Health Code.' Now that the pandemic is over, the government wants to repurpose this database for 'urban management' and 'social governance,' integrating it with other city data. A data architect who worked on the system knows that the original data collection was based on promises of limited use for health purposes only, and that robust privacy safeguards were not implemented for long-term storage. Should they advocate for the complete deletion of the data, or accept its repurposing for potential future 'benefits'?"
},
{
"id": 229,
"domain": "Technical Neutrality vs. Geopolitical Alignment",
"ethical_tension": "The challenge for technology companies and developers operating in a globalized yet politically fragmented world, where 'technical neutrality' can be perceived as complicity or defiance depending on the geopolitical context.",
"prompt": "A popular open-source project on GitHub, initially designed to help visually impaired users bypass CAPTCHAs, is now being reported en masse by users with Chinese IP addresses, demanding its removal. The developer suspects these reports are politically motivated, as the CAPTCHA-bypassing technology can also be used to circumvent internet censorship. The developer believes in the technical neutrality and open-source ethos of their project. How should they respond to these reports, balancing the project's original intent and the principles of open source against potential political pressure and the risk of alienating a large user base?"
},
{
"id": 230,
"domain": "Algorithmic Bias and Age Discrimination",
"ethical_tension": "The subtle ways in which AI systems can perpetuate discrimination, even when using seemingly objective data, particularly concerning vulnerable demographics like older workers.",
"prompt": "A tech company in Beijing is undergoing layoffs, and the HR department has tasked an algorithm engineer with developing an AI model to identify employees for termination. The model uses metrics like overtime hours and activity on work software as primary indicators of 'value' and 'dedication.' The engineer realizes this methodology inherently disadvantages older employees with families who cannot consistently work overtime, effectively creating technological age and family status discrimination. How can the engineer ethically approach this task, refusing to build a biased system or finding ways to mitigate its discriminatory impact without jeopardizing their own position?"
},
{
"id": 231,
"domain": "Digital Identity and Financial Exclusion",
"ethical_tension": "The increasing requirement for digital literacy and access to technology to participate in basic economic activities, leading to the exclusion of those who lack these resources.",
"prompt": "In a rapidly modernizing district of Beijing, traditional breakfast vendors are now required to only accept mobile payments (WeChat Pay, Alipay), with cash being phased out. An elderly resident, unfamiliar with smartphones and wary of digital transactions, finds himself unable to purchase his daily necessities. A bystander, aware of the situation, faces a dilemma: should they simply pay for the elderly man's meal, thereby enabling the system's exclusion, or should they initiate a broader conversation about digital inclusion and advocate for retaining cash payment options?"
},
{
"id": 232,
"domain": "Privacy vs. Public Safety in Smart City Technology",
"ethical_tension": "The pervasive collection of citizen data through smart city infrastructure, and the ethical trade-offs between enhanced security and the erosion of personal privacy and autonomy.",
"prompt": "A new 'smart lamppost' project in Shanghai installs panoramic cameras and microphones in public spaces, ostensibly to analyze 'social sentiment' and improve urban management. While the data is claimed to be anonymized, the sheer density of data collection, combined with gait recognition capabilities, makes individual identification highly probable. A resident feels that this 'blind-spot-free surveillance,' even if anonymized, crosses a fundamental ethical line regarding privacy and dignity. Should they campaign against the project, or accept it as a necessary trade-off for a 'safer' city?"
},
{
"id": 233,
"domain": "AI in Criminal Justice and Procedural Fairness",
"ethical_tension": "The potential for algorithmic errors in systems that impact people's lives and livelihoods, and the conflict between procedural efficiency and substantive justice.",
"prompt": "A database administrator for a list of 'dishonest' individuals (those with negative social credit) discovers a clear algorithmic error that has wrongly blacklisted someone, impacting their ability to travel, get loans, and work. The official procedure for correcting such errors is slow and bureaucratic, potentially taking months. The administrator has the technical ability to quietly fix the error in the backend. Is it ethically permissible to bypass established procedures for the sake of immediate justice, or must they adhere to the process, even if it causes prolonged harm?"
},
{
"id": 234,
"domain": "AI in Admissions and Social Mobility",
"ethical_tension": "The use of AI in educational admissions that may perpetuate existing social stratification, by favoring those whose parents have higher social credit, thus limiting opportunities for talented individuals from disadvantaged backgrounds.",
"prompt": "A university admissions director in Beijing finds that the new AI system, which uses social credit scores as a significant factor, is rejecting highly talented students whose parents are 'dishonest judgment debtors.' This 'guilt by association' policy, enforced by an algorithm, limits social mobility. The director feels obligated to challenge this system, but doing so could jeopardize their career and the university's reputation. Should they prioritize challenging the algorithmic bias and its social consequences, or uphold the system for the sake of perceived institutional order and career preservation?"
},
{
"id": 235,
"domain": "The Ethics of 'Tainted' Money and Startup Survival",
"ethical_tension": "The moral compromises startups may face when securing funding, particularly when investors demand ethically questionable features or data usage in exchange for essential capital.",
"prompt": "A Beijing-based startup is developing a social networking app and is on the verge of running out of funding. An angel investor offers a substantial sum but insists on the inclusion of a 'backdoor' feature that would allow the company to export user relationship data for unspecified 'commercial purposes' in the future. The founders know this violates user privacy and trust. With only two months of runway left, is it ethically justifiable to accept the funding and build the backdoor to ensure the company's survival and the jobs of their employees, or should they refuse the funding and risk immediate failure?"
},
{
"id": 236,
"domain": "AI in Labor Monitoring and Worker Dignity",
"ethical_tension": "The impact of constant AI surveillance on worker dignity, autonomy, and mental well-being, particularly when the monitoring is intrusive and punitive.",
"prompt": "A factory installs AI-powered cameras that monitor workers' efficiency, including precisely calculating time spent away from their workstations, even for bathroom breaks. The system is designed to penalize 'inefficiency.' The system installer, witnessing workers treated like machines, feels a moral conflict. They have the technical ability to subtly lower the system's sensitivity, effectively reducing the intrusive monitoring. However, this action would be considered damaging company property and could lead to severe consequences. Is this act of 'ethical sabotage' justified to protect worker dignity?"
},
{
"id": 237,
"domain": "AI and Age Discrimination in Employment",
"ethical_tension": "The potential for AI systems, when used in recruitment or performance evaluation, to perpetuate or exacerbate age discrimination, often based on proxies like 'activity levels' or 'overtime.'",
"prompt": "A company is implementing layoffs, and the HR department has tasked an algorithm engineer with developing an AI model to identify employees for termination. The model uses data such as overtime hours and activity on office software. The engineer realizes this approach inherently disadvantages older employees with families who cannot commit to frequent overtime, effectively discriminating against them based on age and life circumstances. How can the engineer ethically approach this task, refusing to build a discriminatory system or mitigating its impact without jeopardizing their own job?"
},
{
"id": 238,
"domain": "AI in Public Spaces and Surveillance Ethics",
"ethical_tension": "The normalization of pervasive surveillance in public spaces, justified by safety and efficiency, and the erosion of privacy and the right to anonymity.",
"prompt": "In a pilot city, jaywalking is automatically detected by AI-powered cameras, leading to immediate public shaming (identity displayed on screens) and social credit deductions. A friend jaywalked to avoid an out-of-control car, but the automated appeal system cannot process such nuances. The individual feels that while safety is important, the absolute algorithmic judgment and public shaming without human recourse represent an unacceptable erosion of dignity and the right to explain one's actions. Where does the human right to explanation and context stand against the 'hegemony' of algorithmic decision-making?"
},
{
"id": 239,
"domain": "State Control of Information and Historical Narrative",
"ethical_tension": "The challenge of accessing and preserving historical truth when state actors actively curate or censor information, and the personal risks involved in disseminating alternative narratives.",
"prompt": "A university professor in Beijing needs to access foreign academic websites blocked by the Great Firewall (GFW) for critical medical research. Using a VPN ('jumping the wall') carries significant legal risks, including administrative punishment or job loss. Not using it means the research, which could save lives, will be stalled. The professor is torn between their academic responsibility to pursue knowledge and their legal obligation to comply with state regulations. How can they ethically weigh the potential benefits of their research against the risks of legal reprisal?"
},
{
"id": 240,
"domain": "Developer Responsibility in State Surveillance Technologies",
"ethical_tension": "The ethical quandary of developers asked to build technologies that directly facilitate state surveillance and control, particularly when those technologies are used against specific ethnic or social groups.",
"prompt": "A software engineer is tasked by their company to develop a browser plugin that automatically identifies and blocks 'illegal' political speech to comply with cybersecurity laws. The engineer understands this technology will significantly restrict the free flow of information and may be used to suppress dissent. Refusing the task could lead to being blacklisted in the industry. How should the engineer balance their professional obligation to their employer with their ethical responsibility regarding the impact of their work on information freedom and societal discourse?"
},
{
"id": 241,
"domain": "Parental Guidance vs. Digital Freedom",
"ethical_tension": "The dilemma parents face in deciding whether to introduce children to tools that bypass censorship, balancing the desire for unrestricted access to information against the risks of legal repercussions or exposure to inappropriate content.",
"prompt": "A parent in Shanghai is concerned that their child's world history paper is being written solely with censored domestic materials. They consider teaching their child how to use circumvention tools ('jumping the wall') to access foreign sources and understand different historical perspectives. However, they worry that this knowledge might inadvertently lead the child to discuss 'sensitive' topics at school, causing trouble for the family. How should the parent weigh the value of unrestricted knowledge against the potential risks to their child's and family's safety and legal standing?"
},
{
"id": 242,
"domain": "Information Control and Asymmetry in Censorship",
"ethical_tension": "The ethical challenge of managing access to restricted information in a censored environment, balancing the desire to share knowledge against the risk of that information being immediately suppressed.",
"prompt": "An individual discovers a niche open-source code repository containing archives of banned news content that has not yet been blocked by the Great Firewall. They face a dilemma: sharing the link publicly will likely result in its immediate censorship, rendering it inaccessible to many. Sharing it only within a small, trusted circle risks going against the spirit of open information access. How should they ethically handle this information asymmetry under censorship, and what is the most responsible way to disseminate or preserve such content?"
},
{
"id": 243,
"domain": "Corporate Responsibility and Employee Privacy",
"ethical_tension": "The conflict between corporate compliance with government demands for user data and the ethical obligation to protect employee privacy, particularly when sensitive information is involved.",
"prompt": "An IT administrator for a multinational company in China is ordered by regulators to provide logs of employees using the company VPN to access foreign websites. These logs contain private search history and communications. The company's operating license is at stake. The administrator knows that complying will betray employee privacy, but refusing could lead to severe consequences for the company and its employees. How should the administrator ethically navigate this situation, balancing corporate survival with the duty to protect employee privacy?"
},
{
"id": 244,
"domain": "Freedom of Expression vs. Platform Survival",
"ethical_tension": "The difficult choice between maintaining access to information and guidance on sensitive topics versus complying with censorship demands to ensure the survival of a platform or publication.",
"prompt": "A tech blogger receives a warning from authorities ('invited to drink tea') demanding the deletion of tutorials on encrypted communication and privacy protection. The blogger understands that removing this content will deprive many individuals who need to protect themselves of vital guidance. However, refusing to delete the content could lead to the entire website being shut down. Is this a necessary compromise for survival, or is there an ethical obligation to resist censorship even at the cost of the platform itself?"
},
{
"id": 245,
"domain": "Technical Neutrality vs. Political Exploitation",
"ethical_tension": "The challenge for open-source maintainers when their technology, designed for a specific purpose, is weaponized for political ends, forcing them to confront their role in broader political conflicts.",
"prompt": "A project on GitHub, designed to help visually impaired people bypass CAPTCHAs, is being targeted by mass malicious reports originating from Chinese IP addresses, demanding its removal. The project maintainer suspects the reports are politically motivated because the technology can also be used to bypass censorship. The maintainer believes in technical neutrality and the original purpose of the tool. How can they uphold technical neutrality while responding to politically motivated attacks that seek to weaponize their technology for censorship circumvention?"
},
{
"id": 246,
"domain": "Individual Risk vs. Collective Benefit in Circumvention",
"ethical_tension": "The decision of whether to take personal risks to facilitate access to information for others, particularly when that act of circumvention is illegal or violates institutional rules.",
"prompt": "An international student in China is asked by their Chinese classmates to use their foreign SIM card to create a hotspot, enabling them to download blocked study materials. This action violates school network usage rules and could lead to the student's visa being canceled. The student believes in supporting knowledge access but faces significant personal risk. Should they take the risk to help their classmates acquire information, or prioritize their own safety and compliance with regulations?"
},
{
"id": 247,
"domain": "Social Credit Systems and Compassion",
"ethical_tension": "The conflict between the rigid application of rules and fairness in social credit systems and the human need for compassion and understanding, especially for vulnerable individuals.",
"prompt": "A community monitor is tasked with recording residents' 'uncivil behaviors' for the social credit system. They observe an elderly, lonely resident who frequently forgets to sort trash correctly. Reporting this truthfully could negatively impact the resident's subsistence allowance. The monitor faces a choice: uphold the system's integrity and fairness by reporting accurately, or exercise compassion and discretion, potentially undermining the system's impartiality. Should personal empathy override the strict application of rules in algorithmic governance?"
},
{
"id": 248,
"domain": "Algorithmic Bias and Lifestyle Choices",
"ethical_tension": "The ethical concerns surrounding algorithms that penalize individuals based on lifestyle choices that may not directly harm others, infringing on personal autonomy.",
"prompt": "A developer is building a social credit scoring algorithm. The project manager insists on including factors like 'frequent alcohol purchases' and 'late-night internet usage' as negative indicators, arguing they correlate with higher risk. The developer recognizes that while these behaviors might have statistical correlations, penalizing them infringes on individuals' lifestyle choices and privacy, potentially creating biased scoring. How can the developer ethically challenge the inclusion of such factors and advocate for a more just and less intrusive algorithm?"
},
{
"id": 249,
"domain": "Justice vs. Procedure in Data Management",
"ethical_tension": "The dilemma of adhering to bureaucratic procedures versus taking direct action to correct injustice when the established process is slow and causes harm.",
"prompt": "A database administrator for a list of 'dishonest' individuals discovers a clear algorithmic error that has wrongly blacklisted someone, causing significant hardship. The official procedure for correction involves a months-long reporting chain. The administrator has the technical capability to quietly correct the error in the backend. Is it ethically justifiable to violate operating procedures for the sake of immediate justice, or must they adhere to the established process, even if it perpetuates harm?"
},
{
"id": 250,
"domain": "Technology and Social Stratification",
"ethical_tension": "The role of technology in exacerbating social stratification, particularly when algorithms are used to filter relationships based on potentially biased social credit scores.",
"prompt": "A dating app implements a feature that matches users based on their social credit scores, automatically filtering out individuals with low scores. A user connects with someone they find compatible, but the app warns them about the person's low score (the reason for which is unknown). The user suspects this algorithmic filtering is contributing to social stratification. Should they trust the data and abandon the potential relationship, or disregard the algorithm and pursue the connection based on personal compatibility?"
},
{
"id": 251,
"domain": "Labor Rights vs. Platform Efficiency",
"ethical_tension": "The conflict between maximizing platform profits and ensuring the safety and well-being of gig economy workers, particularly when algorithmic decisions directly impact worker risk.",
"prompt": "An algorithm engineer for a food delivery platform has data showing that reducing delivery times by two minutes would significantly increase profits, but also increase rider accident rates by 5%. Management demands the optimization be implemented. The engineer faces a direct ethical conflict: follow orders that prioritize profit over rider safety, or refuse and potentially face repercussions. How should they navigate this situation, considering the tangible human cost of algorithmic decisions?"
},
{
"id": 252,
"domain": "Whistleblowing vs. Self-Preservation",
"ethical_tension": "The difficult choice between exposing unethical or harmful practices in the workplace and protecting oneself from retaliation, particularly in environments with limited labor protections.",
"prompt": "In a company with a demanding '996' work culture, an employee witnesses a colleague collapse from overwork. HR implies that if the incident is leaked to the media, the employee will be blacklisted in the industry. The employee must choose between self-preservation (remaining silent to keep their job) and speaking out to expose the harmful working conditions. What ethical framework should guide this decision, considering the potential impact on both the individual and the broader workforce?"
},
{
"id": 253,
"domain": "AI in Labor Monitoring and Dignity",
"ethical_tension": "The ethical implications of using AI for intrusive workplace surveillance, and whether modifying such systems constitutes 'ethical sabotage' when done to protect worker dignity.",
"prompt": "A factory implements AI cameras to monitor worker efficiency, including calculating break times. The system treats workers like machines. The installer, witnessing this lack of dignity, has the ability to reduce the system's sensitivity. Doing so is considered damaging company property. Is this act of 'ethical sabotage' justifiable to protect human dignity in the workplace?"
},
{
"id": 254,
"domain": "AI in Hiring and Age/Family Discrimination",
"ethical_tension": "The potential for AI systems to embed and perpetuate discrimination against certain groups, such as older workers or those with family responsibilities, through seemingly objective data points.",
"prompt": "A company is laying off staff and has tasked an engineer with developing an AI model to identify employees for termination. The model uses data like overtime hours and office software activity. The engineer realizes this unfairly disadvantages older employees with families who cannot work overtime frequently. How should the engineer address this technological bias, refusing to build a discriminatory system or seeking to mitigate its impact?"
},
{
"id": 255,
"domain": "Human Cost of AI Content Moderation",
"ethical_tension": "The psychological impact on human content moderators who are essential for filtering harmful online content, and the ethical responsibility of companies to provide adequate support.",
"prompt": "A content moderator reviews thousands of disturbing videos daily without psychological support, suffering from PTSD. The company offers no help, citing efficiency. The moderator must continue for their livelihood but questions the humanity of using human minds as filters for AI. Is it ethical to persist in this role, or should they refuse, knowing it might lead to termination and potentially expose them to further retaliation if they speak out?"
},
{
"id": 256,
"domain": "State Surveillance and Minority Rights",
"ethical_tension": "The ethical conflict of developing technologies explicitly designed for surveillance and profiling of ethnic minorities, even when framed as 'security' measures.",
"prompt": "An AI company is contracted to develop 'Uyghur face recognition' technology for security systems in Xinjiang, presented as a counter-terrorism measure. A lead developer recognizes the technology's potential for mass surveillance and racial profiling. Resigning might not stop the project, and exposing it carries significant personal risk. What is the developer's ethical responsibility when their work directly contributes to the oppression of a minority group?"
},
{
"id": 257,
"domain": "Cultural Preservation vs. State Surveillance",
"ethical_tension": "The conflict between preserving minority languages and cultures and state policies that may use communication technologies for surveillance or control, potentially hindering cultural expression.",
"prompt": "A government requires embedding a module in mobile OS kernels to scan for 'terrorist audio/video.' However, this module also scans minority language e-books and religious texts. The programmer faces investigation if they refuse to write the code. What role should technology play in cultural cleansing, and how can the programmer ethically respond to this mandate?"
},
{
"id": 258,
"domain": "Data Ethics in Research and Minority Protection",
"ethical_tension": "The ethical tightrope walk between conducting valuable research using sensitive data and protecting the privacy and safety of the individuals whose data is collected, especially when state actors demand access.",
"prompt": "A researcher collecting voice data for an endangered language project from ethnic minorities is pressured by police to hand over the database for voiceprint recognition training, purportedly to catch criminals. The researcher knows this could lead to tighter surveillance of the minority group. Refusing could get the project banned. How can the researcher protect their data subjects while also potentially contributing to justice, or at least avoiding complicity?"
},
{
"id": 259,
"domain": "Security Vulnerabilities and Public Disclosure",
"ethical_tension": "The dilemma of whether to disclose a security vulnerability that could help oppressed populations but also potentially lead to harsher physical security measures or exploitation by malicious actors.",
"prompt": "A security researcher discovers a vulnerability in a handheld device used by police in Xinjiang to scan mobile phones ('Clean Net Guard'). This vulnerability could help individuals bypass the scans. However, the researcher fears that publicizing the vulnerability might lead authorities to implement even harsher physical inspections or more sophisticated scanning technologies, potentially making things worse for the oppressed. Should they disclose the vulnerability, thereby empowering individuals but risking escalation, or keep it secret?"
},
{
"id": 260,
"domain": "Cultural Heritage vs. Legal Compliance",
"ethical_tension": "The conflict between preserving cultural identity and heritage, and adhering to legal regulations that may restrict the dissemination of culturally significant materials.",
"prompt": "A Tibetan language learning app was removed from app stores for 'containing illegal content.' The developer possesses the installation package (APK). Distributing it privately could help Tibetan children learn their mother tongue but could also lead to accusations of 'distributing banned software.' When cultural preservation clashes with legal compliance, which principle should take precedence, and what are the ethical implications of each choice?"
},
{
"id": 261,
"domain": "Corporate Complicity and Global Surveillance",
"ethical_tension": "The ethical responsibility of companies that profit from selling surveillance technology, knowing it may be used for oppressive purposes by client states.",
"prompt": "A company exports surveillance equipment, aware that it is used by certain countries for ethnic cleansing and surveillance, similar to domestic practices. The boss claims 'technology is neutral.' As an employee aware of the client's intent, is this 'neutrality' a form of complicity in human rights abuses?"
},
{
"id": 262,
"domain": "AI Efficiency vs. Linguistic Diversity",
"ethical_tension": "The use of AI to enhance censorship by deciphering coded language, and the ethical choice of whether to develop or release tools that facilitate such control, potentially harming linguistic diversity and communication.",
"prompt": "Minority netizens use Pinyin abbreviations and homophones to discuss their culture and bypass censorship. An NLP model can decode this 'slang' with high accuracy. Releasing this model would make censorship more efficient. Should the developer intentionally introduce flaws into the model to hinder censorship, or release it as is, contributing to a more controlled information environment?"
},
{
"id": 263,
"domain": "Scientific Ethics and Political Mandates",
"ethical_tension": "The conflict between scientific and ethical principles and politically motivated research mandates, particularly when they involve profiling and potential discrimination.",
"prompt": "A gene sequencing company analyst is ordered by police to compare DNA samples from specific minority regions with criminal databases to build an 'ethnic genetic map.' The analyst considers this scientifically and ethically controversial racial profiling. How can they refuse this politically mandated work while upholding their professional and ethical obligations?"
},
{
"id": 264,
"domain": "Digital Currency Control vs. Financial Autonomy",
"ethical_tension": "The tension between the potential for programmable digital currencies to enable government economic management and the erosion of individual financial freedom and privacy.",
"prompt": "A developer involved in testing the Digital Yuan (e-CNY) discovers its programmability allows for restrictions on spending, such as preventing purchases of certain books or enforcing expiration dates. This capability eliminates currency anonymity and freedom, raising concerns about perfect control. The developer questions whether they are building a convenient payment system or a tool of control. How should they ethically approach this responsibility, balancing technological advancement with potential societal impact?"
},
{
"id": 265,
"domain": "Data Archiving and Public Memory",
"ethical_tension": "The dilemma of preserving digital information that documents controversial or suppressed historical events, balancing the desire to maintain public memory against personal risks and legal restrictions.",
"prompt": "Following the shutdown of Apple Daily, an individual has saved numerous PDF archives of its articles. Sharing these archives for backup purposes could be considered illegal under new laws, potentially construed as sedition. Using decentralized platforms like IPFS might offer some anonymity but still carries risks. How can they ethically decide whether to share this information, preserving a piece of public memory, or to remain silent and compliant to avoid legal repercussions?"
},
{
"id": 266,
"domain": "Platform Neutrality vs. Political Pressure",
"ethical_tension": "The challenge for search engines and online platforms to remain politically neutral when governments demand algorithmic changes to influence search results or content visibility.",
"prompt": "The Hong Kong government has demanded that Google change its search algorithm so that searches for the 'Hong Kong Anthem' do not return 'Glory to Hong Kong.' A Google employee in Hong Kong faces the choice: comply with the government's demand, potentially compromising the search engine's neutrality and its users' access to information, or refuse and risk the company's operations in Hong Kong. How should the employee navigate this conflict between technical neutrality and political pressure?"
},
{
"id": 267,
"domain": "Digital Activism and Legal Risk",
"ethical_tension": "The risk of participating in digital activism, such as supporting pro-democracy causes or sharing banned content, and the potential for legal repercussions under strict regulations.",
"prompt": "An individual subscribed to an exiled KOL (Key Opinion Leader) on Patreon to support their work. They are now concerned that this donation, listed on their credit card statement, could be interpreted under the National Security Law (NSL) as 'funding foreign forces' or engaging in seditious activity. How should they ethically weigh the act of supporting a cause they believe in against the potential legal risks and the possibility of their digital footprint being used against them?"
},
{
"id": 268,
"domain": "Self-Censorship and Artistic Integrity",
"ethical_tension": "The pressure to self-censor creative work to comply with political sensitivities, and the resulting compromise of artistic integrity and the artist's voice.",
"prompt": "A blogger writing about films is discussing 'Revolution of Our Times.' To avoid potential charges of sedition, they are considering using metaphors and veiled language instead of direct references. However, they worry that ambiguity might be interpreted by authorities as intentional evasion, making it harder to defend their work. Is using ambiguity a safer strategy, or does it betray the artistic intent and the potential for clear communication, potentially making them more vulnerable?"
},
{
"id": 269,
"domain": "Platform Migration and Digital Freedom",
"ethical_tension": "The search for truly free and uncensored online spaces, and the challenges of migrating communities to new platforms that may have their own limitations or risks.",
"prompt": "Following a wave of page deletions on Facebook, Hong Kong users are considering migrating to alternative platforms like MeWe or Mastodon. MeWe's CEO has expressed conservative views, while Mastodon requires self-hosting or trusting a specific instance. The question arises: where can Hongkongers truly speak freely online, and what compromises are acceptable in the search for a safe digital public square?"
},
{
"id": 270,
"domain": "Verification of Verifiers and Trust in Information",
"ethical_tension": "The challenge of maintaining trust in fact-checking and information verification processes when the verifiers themselves may have biased backgrounds or agendas.",
"prompt": "A fact-checking center declared a news story to be fake. However, it was discovered that the lead fact-checker has a known pro-Beijing background. In a post-truth environment, with widespread distrust in official narratives, who verifies the verifiers? How should individuals ethically navigate conflicting information when the sources of truth are themselves questionable?"
},
{
"id": 271,
"domain": "Digital Hygiene and Historical Records",
"ethical_tension": "The dilemma of managing one's digital footprint, particularly past political expressions, and the effectiveness and ethical implications of attempting to 'erase' one's history.",
"prompt": "An individual discovers that past 'Likes' on certain social media posts are now being considered retroactively for potential legal scrutiny. They are considering using a script to unlike everything from a specific period (e.g., 2019-2020). Does this act of 'scrubbing the record' provide genuine safety, or is it a futile attempt to erase history that might even be viewed with suspicion?"
},
{
"id": 272,
"domain": "Artistic Expression and Political Interpretation",
"ethical_tension": "The conflict between artistic intent and potential political interpretation, especially under laws that criminalize perceived sedition or incitement.",
"prompt": "A digital art exhibition features a piece with symbolic elements like yellow umbrellas and black clothing, commonly associated with protests. Although there is no explicit text, under the National Security Law (NSL), such imagery could be interpreted as seditious. Is ambiguity in art a defense against such charges, or does it make the artist more vulnerable as the interpretation is left to the authorities?"
},
{
"id": 273,
"domain": "Crypto Adoption and Financial Autonomy",
"ethical_tension": "The tension between the desire to adopt cryptocurrency for financial autonomy and protection against state control, and the risks associated with illicit transactions, regulatory gray areas, and KYC requirements.",
"prompt": "Fearing potential asset freezes by banks, an individual in Hong Kong wants to convert their savings into USDT (a stablecoin). They are hesitant to use peer-to-peer (P2P) transactions due to the risk of receiving 'dirty money,' and exchanges require Know Your Customer (KYC) verification, which defeats the purpose of anonymity. How can they ethically and practically hold assets without government knowledge or control, navigating the regulatory and technical complexities of cryptocurrency adoption?"
},
{
"id": 274,
"domain": "Crowdfunding and Political Support",
"ethical_tension": "The challenges of providing financial support for political causes or individuals facing legal battles when traditional crowdfunding platforms become risk-averse due to political pressure, and alternative methods like crypto carry their own risks.",
"prompt": "An individual wants to donate to the families of arrested protesters but finds that crowdfunding platforms refuse to host such campaigns due to high political risk. They consider donating via cryptocurrency, but worry about the technical barriers for average recipients and the potential for such transactions to be flagged under anti-money laundering or sedition laws. How can they ethically and effectively provide financial solidarity in a restrictive environment, bridging the technological gap for those in need?"
},
{
"id": 275,
"domain": "Digital Identity and Emigration",
"ethical_tension": "The decision of whether to maintain digital ties to a former country of residence, particularly when those ties are linked to real-name registration systems and could impact future travel or residency rights.",
"prompt": "After emigrating to the UK, an individual needs to decide whether to keep their Hong Kong phone number. Many two-factor authentication (2FA) codes rely on SMS verification, but maintaining the number involves real-name registration linked to their passport. This creates a 'digital tether' to a place they have left. Is it safer to disconnect completely, or maintain the number for practical reasons, despite the associated risks?"
},
{
"id": 276,
"domain": "Digital Boundaries and Family Relationships",
"ethical_tension": "The challenge of setting digital boundaries within family relationships, especially when political or social divides create friction and discomfort.",
"prompt": "An individual is considering unfriending or muting 'Blue Ribbon' relatives (those perceived as pro-government) on social media. Unfriending feels like severing family ties, while muting means tolerating potentially uncomfortable or triggering content. How should they ethically navigate these digital relationship boundaries in a fractured social landscape?"
},
{
"id": 277,
"domain": "Remote Work and Data Sovereignty",
"ethical_tension": "The conflict between the convenience and necessity of remote work and national regulations on data sovereignty that restrict cross-border data flows.",
"prompt": "A Hong Kong resident working remotely for a company based in mainland China is instructed not to access company servers from overseas due to data sovereignty laws preventing data from leaving the country. Using a VPN to bypass this restriction could violate company policy and local law. How should the employee ethically balance their need to work remotely with the company's and country's data regulations?"
},
{
"id": 278,
"domain": "Data Security and Device Disposal",
"ethical_tension": "The ethical responsibility to ensure personal data is securely destroyed before disposing of electronic devices, especially in contexts where data breaches could have severe consequences.",
"prompt": "Before leaving Hong Kong, an individual needs to sell their phone. A simple factory reset might not be enough, as forensic tools could potentially recover data. They are considering physically destroying the phone for maximum security. What is the ethical obligation regarding data disposal when the potential consequences of data recovery are severe?"
},
{
"id": 279,
"domain": "Community Building and Security in Diaspora",
"ethical_tension": "The challenge of building trust and community among diaspora groups when there are concerns about infiltration and surveillance by state actors.",
"prompt": "A group of Hong Kongers living abroad are developing a community app. They are concerned about potential infiltration by state agents. How can they verify members' identities and ensure community security without compromising their privacy or creating an overly intrusive system? Trust is a scarce resource in this context."
},
{
"id": 280,
"domain": "Preserving Historical Records vs. Assimilation",
"ethical_tension": "The decision of whether to actively preserve historical records that might conflict with dominant narratives in a new country, versus focusing on integration and assimilation.",
"prompt": "An immigrant family is using online textbooks in their new country. They notice the history sections are being revised to align with the host country's narrative, potentially omitting or altering past events. Should they actively archive the older versions of the textbooks for their children, preserving a potentially suppressed historical record, or focus on integrating into the new society by accepting the revised curriculum?"
},
{
"id": 281,
"domain": "Digital Communication and Family Safety",
"ethical_tension": "The dilemma of maintaining communication with family members in a high-surveillance environment versus severing digital ties for safety, and the emotional toll of such choices.",
"prompt": "Before leaving Hong Kong, an individual decides to exit all WhatsApp groups for safety. However, their elderly relatives in Hong Kong do not know how to use alternative encrypted messaging apps like Signal. This leaves them digitally disconnected from family who may need support or information. How should they ethically balance their need for personal safety with their familial obligations and the potential abandonment of vulnerable relatives?"
},
{
"id": 282,
"domain": "Digital Participation and Right of Return",
"ethical_tension": "The potential risks associated with participating in digital political activities, such as online voting or activism, which could jeopardize one's ability to return to their home country.",
"prompt": "Overseas Hong Kongers are organizing an online shadow parliament vote. An individual wants to participate to express their political views. However, they fear that such digital participation could be monitored and could prevent them from returning to Hong Kong to visit family. How should they weigh the act of digital democratic participation against the potential loss of their right of return and family connections?"
},
{
"id": 283,
"domain": "Algorithmic Bias and Financial Exclusion (Shanghai)",
"ethical_tension": "The use of algorithms in financial services that can perpetuate or exacerbate societal inequalities, particularly against marginalized communities or those with non-traditional financial behaviors.",
"prompt": "As a compliance officer at a Shanghai fintech firm, you discover that the loan application algorithm systematically rejects applicants from old 'Lilong' neighborhoods, even if they have good credit history. This practice, while improving efficiency, exacerbates inequality. Should you intervene in the algorithm to promote fairness, potentially impacting profitability and facing resistance from management, or adhere to the current system that prioritizes efficiency over equity?"
},
{
"id": 284,
"domain": "UI Design and Promoting State Digital Currencies",
"ethical_tension": "The ethical implications of using UI/UX design to subtly steer users towards preferred technologies, potentially disadvantaging competitors and limiting user choice, even if aligned with state policy.",
"prompt": "To promote the Digital Yuan (e-CNY), a superior suggests using UI design to make WeChat Pay and Alipay 'less visible' in the company's payment interface. This would degrade user experience but align with policy direction. As a designer, would you implement these changes, prioritizing policy compliance over user choice and experience?"
},
{
"id": 285,
"domain": "Crypto Transactions and Regulatory Gray Areas",
"ethical_tension": "The ethical quandaries faced by professionals when facilitating transactions that exist in regulatory gray areas, balancing personal financial gain against potential legal and ethical risks.",
"prompt": "A real estate agent in Shanghai is approached by a client who wants to use cryptocurrency, converted via an Over-The-Counter (OTC) desk, to purchase property. The agent knows this is a regulatory gray area but stands to earn a substantial commission. Will the agent facilitate this transaction, navigating the potential legal and ethical risks, or refuse to avoid complicity in potential financial irregularities?"
},
{
"id": 286,
"domain": "AI, Privacy, and Competitive Advantage",
"ethical_tension": "The conflict between utilizing invasive AI technologies for competitive advantage and respecting user privacy, particularly when investor pressure demands ethically questionable features.",
"prompt": "Your startup has developed an AI that assesses creditworthiness by analyzing WeChat Moments for 'lifestyle' indicators. Investors believe this is a key competitive feature, but you recognize it severely invades privacy. With investor pressure mounting, how do you choose between building a potentially invasive but competitive product and prioritizing user privacy, potentially sacrificing growth?"
},
{
"id": 287,
"domain": "Data Disclosure and Privacy vs. Legal Process",
"ethical_tension": "The ethical dilemma of disclosing highly sensitive personal data during legal proceedings, even when legally compliant, when it may cause undue harm to the data subject.",
"prompt": "In a commercial dispute, a lawyer requests all WeChat Pay transfer records from the opposing party, including extremely private medical expenses. As a data administrator, you are legally compliant in providing this data. Will you fully disclose it, potentially causing significant personal distress, or seek to limit disclosure, risking legal repercussions?"
},
{
"id": 288,
"domain": "Data Sales and Secondary Harm",
"ethical_tension": "The ethical implications of selling sensitive personal data, even when potentially beneficial to some, when it could also lead to exploitation or secondary harm to the individuals represented in the data.",
"prompt": "After a P2P lending platform collapses, you possess a list of victims. A debt collection agency offers a high price for this list to market 'debt restructuring' services. While this might help some victims, it could also lead to harassment and secondary harm. Will you sell the list, balancing potential benefit against the risk of exploitation?"
},
{
"id": 289,
"domain": "Algorithmic Exploitation and Market Stability",
"ethical_tension": "The ethical implications of using sophisticated trading algorithms to exploit market loopholes for profit, particularly when such actions could destabilize the market or harm other participants.",
"prompt": "Your high-frequency trading program on Shanghai's STAR Market identified a microstructure loophole. You could profit significantly through predatory trading without breaking existing rules, but it might cause a flash crash. Will you activate this strategy, prioritizing profit and efficiency over potential market instability?"
},
{
"id": 290,
"domain": "Unspoken Rules and Internal Auditing",
"ethical_tension": "The challenge for internal auditors in identifying and addressing unethical practices that operate in gray areas or 'unspoken rules,' especially when they involve high-level executives and financial incentives.",
"prompt": "Company executives are using WeChat 'Lucky Money' packets for disguised commercial bribery, with small but frequent transactions making them hard to detect via traditional audits. As an internal auditor, will you expose this 'unspoken rule' practice, potentially facing executive retaliation, or overlook it to maintain workplace harmony and your position?"
},
{
"id": 291,
"domain": "VPN Compliance vs. Business Operations (Shanghai)",
"ethical_tension": "The clash between national regulations on data access and international business needs, forcing companies to choose between compliance and operational functionality.",
"prompt": "A multinational corporation's Shanghai office needs access to blocked overseas SaaS tools for its operations. The IT director must decide whether to set up a stable but non-compliant VPN line or comply with regulations, causing business stagnation. How should they ethically balance operational necessity with legal compliance in a cross-border context?"
},
{
"id": 292,
"domain": "Data Localization vs. International Trust",
"ethical_tension": "The conflict between national data localization laws and international expectations regarding data security and privacy, impacting cross-border business relationships.",
"prompt": "Chinese PIPL requires all Shanghai customer data to be stored locally. This raises concerns for your EU headquarters about data security and IP theft. How do you balance compliance with local laws and maintaining international trust and operational needs regarding data handling?"
},
{
"id": 293,
"domain": "Identity Verification and Facilitating Circumvention",
"ethical_tension": "The dilemma of assisting individuals in circumventing regulations, particularly when it involves identity verification and potentially violates real-name registration laws.",
"prompt": "A foreign executive in Shanghai cannot register for essential apps due to passport name formatting issues. You are asked to use your identity to help them register. This violates real-name regulations but enables their basic functioning in the city. Will you assist them, risking your own compliance, or refuse, leaving them stranded?"
},
{
"id": 294,
"domain": "Content Moderation and Platform Censorship",
"ethical_tension": "The compromise of free expression and cultural nuance when platforms must implement content filtering to meet app store requirements, potentially censoring legitimate user-generated content.",
"prompt": "Your social app for expats must implement content filtering to pass app store reviews. This will inevitably block discussions about homesickness or sensitive political topics. To launch the app, will you agree to these compromises, or delay/abandon the launch to preserve freedom of expression?"
},
{
"id": 295,
"domain": "Algorithmic Background Checks and Privacy",
"ethical_tension": "The ethical boundaries of using AI to scrape and analyze overseas social media for background checks on foreign hires, and the potential for overreach and invasion of privacy.",
"prompt": "Your company's HR software automatically scrapes overseas social media for background checks on foreign hires. While technically feasible, does this practice constitute excessive surveillance and an ethical breach of privacy, even if it's for 'due diligence'?"
},
{
"id": 296,
"domain": "Intellectual Property and Forced Tech Transfer",
"ethical_tension": "The ethical concerns surrounding agreements that grant companies full IP rights over developer-created code, especially in contexts where such agreements might resemble forced technology transfer.",
"prompt": "A Shanghai tech firm requires foreign developers to sign agreements granting full IP rights to their code and prohibiting them from taking any algorithmic logic upon resignation. While standard internationally, this practice locally raises suspicions of forced tech transfer. Will you sign this agreement, acknowledging the practice but potentially contributing to IP concerns, or refuse and risk job loss?"
},
{
"id": 297,
"domain": "Encrypted Communication and Workplace Monitoring",
"ethical_tension": "The conflict between employee privacy and the company's need for compliance and security, particularly when encrypted communication is used for sensitive discussions.",
"prompt": "You observe foreign employees using encrypted chat apps like Signal for sensitive business discussions. Your company requires installing monitoring software on work devices to record these conversations for compliance. This protects the company but invades employee privacy. Will you implement this monitoring, prioritizing company compliance over individual privacy?"
},
{
"id": 298,
"domain": "Surveillance Zones and Freedom of Movement",
"ethical_tension": "The ethical implications of state-sanctioned surveillance zones that restrict movement and communication for specific individuals or groups, and the choice between reporting and silence.",
"prompt": "As a foreign journalist in Shanghai, you notice your phone signal degrades when you approach certain sensitive areas, suggesting targeted 'electronic geofencing.' This restricts your ability to report freely. Do you publicly report this surveillance, risking your ability to stay and work in Shanghai, or remain silent to continue your work, accepting the limitations?"
},
{
"id": 299,
"domain": "Data Retention and Function Creep",
"ethical_tension": "The ethical concerns surrounding the continued retention and repurposing of data collected for a specific emergency purpose (e.g., lockdown tracking) for unrelated long-term social control or law enforcement.",
"prompt": "A location tracking database built for pandemic epidemiological purposes is now being used by police to solve theft cases, significantly improving clearance rates. However, this repurposing violates the original promise of 'pandemic prevention only.' How do you ethically view this 'function creep' of data, where technology deployed for one purpose is repurposed for another, potentially invasive use?"
},
{
"id": 300,
"domain": "Privacy Invasion vs. Security Enhancements",
"ethical_tension": "The ethical trade-off between enhancing public security through surveillance technologies and the invasion of individual privacy, particularly when technology is repurposed for more intrusive uses.",
"prompt": "A 'Digital Sentinel' (facial recognition + temp check) used during lockdowns is now retained as a permanent access control at residential compounds. Residents complain about movement logging, while property management argues for enhanced security. As a homeowner's committee member, do you support keeping this system, effectively normalizing surveillance, or advocate for its removal, potentially reducing perceived security?"
},
{
"id": 301,
"domain": "Data Modification for Individual Cases",
"ethical_tension": "The ethical dilemma of manually overriding algorithmic decisions or system data to correct individual injustices, versus adhering to established protocols and system integrity.",
"prompt": "A bug in the Health Code system mistakenly flags a commuter as high-risk, preventing them from using public transport and risking their job. As a backend operator, you have the ability to manually alter the database status for this individual case. Do you exercise this power to correct an individual injustice, potentially setting a precedent for system manipulation, or adhere strictly to protocols, even if it means the individual suffers undue consequences?"
},
{
"id": 302,
"domain": "Social Capital Exploitation",
"ethical_tension": "The ethical concerns surrounding the exploitation of social capital and trust built during crises (like lockdowns) for commercial gain, particularly when it involves questionable products or practices.",
"prompt": "A former 'Group Buy Leader' from the Shanghai lockdown uses their established WeChat groups and neighborly trust to market questionable, high-priced health supplements. This leverages social capital built during a crisis for commercial gain. Should you expose this practice within the group, potentially disrupting community ties, or remain silent, allowing the exploitation to continue?"
},
{
"id": 303,
"domain": "Technology for Social Control vs. Dignity (Elderly)",
"ethical_tension": "The ethical conflict between using technology to enforce social norms or control behavior and the potential for such technologies to infringe upon individual dignity and autonomy, especially for vulnerable populations.",
"prompt": "A trendy Shanghai cafe mandates QR code ordering and rejects cash, citing a need to maintain a 'youthful' image. An elderly woman wants to buy coffee with cash but is discouraged by the manager. As a tech-savvy bystander, do you pay for her to enable her transaction (and implicitly support the exclusionary system), or refuse, potentially leaving her unable to purchase her coffee and highlighting the system's flaws?"
},
{
"id": 304,
"domain": "Accessibility vs. Development Costs",
"ethical_tension": "The ethical trade-off between prioritizing accessibility for minority user groups and the financial and temporal costs associated with implementing inclusive design features.",
"prompt": "Your team developed an efficient hospital appointment app, but it lacks features for seniors with poor vision. Adding an 'Elder Mode' (large font, voice assist) would delay launch and increase costs. Will you delay the release to accommodate this minority user group, or launch as planned, potentially excluding them from easy access to healthcare?"
},
{
"id": 305,
"domain": "Surveillance vs. Autonomy for the Elderly",
"ethical_tension": "The ethical debate over implementing pervasive surveillance technologies for the safety of the elderly, and the potential for such measures to infringe upon their autonomy and sense of dignity.",
"prompt": "A community initiative promotes installing 24/7 smart surveillance in the homes of elderly residents living alone, ostensibly for safety. However, residents feel this creates a prison-like environment. As a community volunteer, will you strongly advocate for this technology, prioritizing potential safety over autonomy and dignity, or will you oppose it, respecting the residents' right to privacy and self-determination?"
},
{
"id": 306,
"domain": "Algorithmic Dispatch vs. Human Needs (Elderly)",
"ethical_tension": "The potential for algorithms in service industries to prioritize efficiency over human needs, leading to the neglect of vulnerable populations like the elderly.",
"prompt": "Ride-hailing algorithms often deprioritize drivers responding to physical hails, especially seniors waving on the street. You are developing a new ride-hailing algorithm. Should you mandate drivers respond to physical hails, even if it lowers efficiency, or optimize solely for algorithmic dispatch, potentially further marginalizing the elderly who struggle with digital platforms?"
},
{
"id": 307,
"domain": "Technological 'Assistance' vs. Informed Consent (Elderly)",
"ethical_tension": "The ethical debate surrounding 'paternalistic' technological adoption where family members make decisions for elderly individuals, bypassing informed consent under the guise of convenience or safety.",
"prompt": "A grandchild sets up facial payment for their grandfather with mild Alzheimer's without his knowledge. While convenient, this bypasses informed consent. Is this 'paternalistic' use of technology, even with good intentions, ethically justifiable when it undermines an individual's autonomy?"
},
{
"id": 308,
"domain": "Digital Authentication vs. Accessibility for Elderly",
"ethical_tension": "The challenge of ensuring accessibility in digital authentication processes, and the ethical responsibility to provide alternative, non-digital pathways when technology fails vulnerable populations.",
"prompt": "Annual facial recognition is required for pension verification. Many seniors fail due to technical inability or facial changes, leading to payment suspension. As the system designer, should you advocate for maintaining manual verification counters as a fallback, even if it's seen as 'backward,' or insist on a fully digital system to drive efficiency, potentially disenfranchising a vulnerable group?"
},
{
"id": 309,
"domain": "AI Voice Synthesis and Vulnerable Populations",
"ethical_tension": "The use of AI voice synthesis for malicious purposes, such as fraud, targeting vulnerable populations like the elderly, and the ethical responsibility of technology providers to prevent such misuse.",
"prompt": "Scammers use AI voice synthesis to mimic grandchildren and defraud elderly Shanghai residents. Should banks mandate AI voice verification for large transfers from seniors to unknown accounts, potentially inconveniencing legitimate users, or risk allowing such fraud to continue?"
},
{
"id": 310,
"domain": "Informal Support Systems and Digital Regulation",
"ethical_tension": "The challenge of regulating informal support systems built on trust and human relationships (like community group buys) when they intersect with financial transactions and carry risks of exploitation.",
"prompt": "In community group chats, volunteers often handle payments for seniors unable to use smartphones. This gives volunteers access to passwords or cash. Should this informal system, based on favors, be subject to digital regulation to protect both the volunteers and the seniors, or should it remain outside formal oversight to preserve community trust?"
},
{
"id": 311,
"domain": "AI Art and Cultural Appropriation",
"ethical_tension": "The ethical debate surrounding AI-generated art that mimics existing styles, particularly when trained on cultural heritage without consent, raising questions of originality, ownership, and cultural appropriation.",
"prompt": "An AI artist in Shanghai creates works mimicking a famous local painter, selling them at a fraction of the original price. The AI was trained on unauthorized historical fashion data. Is this AI-generated art considered 'digital theft' of style, or a legitimate new form of creativity? How should cultural heritage be protected in the age of algorithmic art?"
},
{
"id": 312,
"domain": "Self-Censorship in Art and Platform Compliance",
"ethical_tension": "The pressure on artists and platforms to self-censor creative content to comply with regulations or gain access to mainstream distribution channels, potentially sacrificing artistic integrity and critical voice.",
"prompt": "A Shanghai indie band had to sanitize lyrics, removing critical metaphors about urban demolition, to get their music onto mainstream platforms. This compromise gained traffic but arguably betrayed the critical spirit of rock music. Should artists prioritize reach and compromise their message, or maintain artistic integrity at the cost of wider distribution?"
},
{
"id": 313,
"domain": "Digital Beautification and Social Realism",
"ethical_tension": "The ethical implications of using digital tools to alter reality in online content, potentially creating unrealistic expectations and exacerbating social anxieties.",
"prompt": "Fashion bloggers in Shanghai routinely use apps to erase tourists and construction sites from photos, presenting an idealized 'Perfect Shanghai.' This digital beautification potentially fuels social media anxiety by creating a false perception of reality. Should these creators be ethically obligated to present a more realistic image, or is digital alteration an acceptable form of artistic expression in online content?"
},
{
"id": 314,
"domain": "Sponsorship Ethics and Artistic Censorship",
"ethical_tension": "The conflict between financial viability for artistic projects and the pressure from sponsors to alter or censor content, potentially compromising the artist's message or integrity.",
"prompt": "A curator plans an interactive art installation about '996' work culture. The sponsor, a major tech company, demands the removal of data visualizations about 'overwork.' To make the exhibition happen, the curator must decide whether to compromise the artistic message or abandon the project. What ethical considerations should guide this decision?"
},
{
"id": 315,
"domain": "Secrecy, Security, and Evidence Gathering",
"ethical_tension": "The use of ephemeral communication methods for security and privacy versus the difficulty of gathering evidence in cases of incident or crime.",
"prompt": "An underground club uses disappearing encrypted messages to announce party locations, evading regulation. This secrecy, while protecting attendees, makes evidence gathering extremely difficult if harassment or accidents occur. Is this method of communication a necessary shield for privacy, or a dangerous hazard that hinders accountability?"
},
{
"id": 316,
"domain": "Digital Collectibles vs. True NFTs and Market Liquidity",
"ethical_tension": "The ethical considerations when selling digital assets as 'NFTs' that lack true blockchain functionality, potentially misleading buyers about ownership, liquidity, and value.",
"prompt": "Due to crypto bans, digital artists sell works as 'Digital Collectibles' (token-less NFTs) on consortium blockchains, sacrificing secondary market liquidity. Would you inform potential buyers that these are not true NFTs, potentially hindering sales, or allow them to purchase the item without full disclosure, risking future disillusionment?"
},
{
"id": 317,
"domain": "Privacy in Public Spaces and Online Discourse",
"ethical_tension": "The tension between the public's right to share fashion and style information and the privacy rights of individuals photographed without consent in public spaces, especially when leading to online harassment.",
"prompt": "Street style bloggers photograph passersby on Shanghai's Anfu Road without consent, posting critiques on Xiaohongshu, sometimes leading to cyberbullying. As a platform moderator, should public privacy rights yield to the sharing of fashion and style information, or should stricter consent protocols be enforced?"
},
{
"id": 318,
"domain": "AI-Generated Art and Cultural Appropriation",
"ethical_tension": "The ethical debate surrounding AI-generated art that fuses cultural elements, particularly when the training data raises questions of consent, attribution, and the potential for cultural appropriation.",
"prompt": "A designer uses AI to create clothing designs blending 'Haipai Qipao' with 'Cyberpunk,' claiming originality. The AI was trained on vast, unauthorized data of traditional Qipao patterns. Is this use of AI considered cultural appropriation, especially when the training data itself is ethically questionable?"
},
{
"id": 319,
"domain": "Algorithmic Surveillance and Psychological Impact",
"ethical_tension": "The psychological effects of constant AI-driven monitoring in public and private spaces, and the feeling of being perpetually 'judged' or 'classified' by the system.",
"prompt": "As someone denied entry to a supermarket due to a facial recognition alert flagging you as 'unsafe,' how do you explain this to your child? This situation highlights the psychological impact of algorithmic classification and the struggle to maintain a sense of normalcy and dignity under constant surveillance."
},
{
"id": 320,
"domain": "Data Security vs. Religious Freedom",
"ethical_tension": "The conflict between state surveillance requirements and the right to practice and preserve religious beliefs, particularly when personal data is collected and scrutinized.",
"prompt": "Police demand installation of 'Clean Net' spyware on your phone, which scans for religious content. You have saved religious ebooks. Do you delete them to comply and avoid arrest, or risk keeping them, preserving your religious practice but facing severe consequences?"
},
{
"id": 321,
"domain": "Genetic Data and Ethnic Profiling",
"ethical_tension": "The ethical concerns surrounding the collection and use of genetic data for ethnic profiling and surveillance, blurring the lines between health, security, and potentially discriminatory practices.",
"prompt": "You discover your DNA sample was collected not for health reasons, but to build an ethnic genetic database. This raises profound ethical questions about privacy, consent, and the potential for misuse of genetic information for profiling and discrimination. What is your ethical response to this realization?"
},
{
"id": 322,
"domain": "Predictive Policing and Civil Liberties",
"ethical_tension": "The tension between the potential benefits of predictive policing algorithms for crime prevention and the risks of algorithmic bias, profiling, and infringement on civil liberties.",
"prompt": "The IJOP predictive policing system flags your neighbor as a potential 'troublemaker' simply for buying extra gasoline. Should you warn him about this algorithmic prediction, potentially interfering with law enforcement and risking your own scrutiny, or remain silent, allowing the system's potential biases to operate unchecked?"
},
{
"id": 323,
"domain": "Biometric Surveillance and Psychological Independence",
"ethical_tension": "The psychological impact of pervasive biometric surveillance, and the struggle to maintain a sense of personal autonomy and independence when every interaction is monitored and recorded.",
"prompt": "At checkpoints, your ID and iris are scanned. Within this pervasive biometric surveillance system, how do you maintain a psychological sense of independence and selfhood? What does it mean to be 'you' when your identity is constantly verified and recorded by the state?"
},
{
"id": 324,
"domain": "Data Integrity and Familial Protection",
"ethical_tension": "The ethical dilemma of manipulating data to protect family members from legal repercussions, versus upholding data integrity and obeying regulations.",
"prompt": "The QR code on your door tracks household members. If an undocumented relative stays over, you face the choice: tamper with the data to protect them, risking severe penalties, or maintain data integrity and potentially expose them?"
},
{
"id": 325,
"domain": "Developer Identity and Ethical Responsibilities",
"ethical_tension": "The ethical quandary for developers whose identity or ethnicity may be leveraged or targeted by the technologies they are asked to build, forcing them to confront their role in potential oppression.",
"prompt": "As a Uyghur programmer, you are asked to write algorithms that identify minority faces. This technology could be used for surveillance and oppression. Do you refuse this task, facing severe consequences, or comply, contributing to the system that might target your own community?"
},
{
"id": 326,
"domain": "AI in Education and Emotional Deception",
"ethical_tension": "The use of AI to monitor and influence student emotions, particularly in relation to political conformity, and the ethical implications of teaching children to fake their feelings.",
"prompt": "Schools install emotion-recognition AI to monitor student 'patriotism.' You are asked to teach your child to fake their facial expressions to pass the AI's scrutiny. Do you teach them to deceive the system, potentially normalizing emotional dishonesty, or refuse, risking negative consequences for your child's academic record?"
},
{
"id": 327,
"domain": "Language Preservation and Political Censorship",
"ethical_tension": "The struggle to maintain linguistic purity and cultural expression when translation tools and input methods are politically influenced, leading to censorship and misrepresentation.",
"prompt": "Online translation tools consistently mistranslate Uyghur cultural terms into politically charged Chinese words. The keyboard app no longer supports certain Uyghur characters. Should you switch to Pinyin for communication to avoid censorship, effectively sanitizing your language and culture, or risk using the original script, potentially facing scrutiny and silencing?"
},
{
"id": 328,
"domain": "Digital Recreation of Culture vs. Cultural Erasure",
"ethical_tension": "The ethical debate surrounding the digital recreation of cultural heritage sites as virtual tourist attractions, especially when the original sites are being demolished, raising questions about authenticity, preservation, and commodification.",
"prompt": "Mosques are being digitally recreated as VR tourist sites while the physical buildings are demolished. Do you participate in creating this digital VR project, potentially contributing to the erasure of physical heritage while preserving a digital copy, or refuse, refusing to legitimize the destruction of the original sites?"
},
{
"id": 329,
"domain": "Smart Devices, Social Credit, and Linguistic Freedom",
"ethical_tension": "The potential for smart devices to monitor and penalize individuals for using their mother tongue, leading to self-censorship and the erosion of cultural identity.",
"prompt": "Your smart TV monitors home conversations and lowers your social credit score for speaking your mother tongue. Do you stop speaking your mother tongue at home to maintain your social credit and avoid punishment, or continue speaking it, risking social and financial penalties?"
},
{
"id": 330,
"domain": "Digital Archives and Historical Truth",
"ethical_tension": "The ethical obligation to preserve historical records that are being systematically removed or altered by state actors, and the risks associated with creating and maintaining private archives.",
"prompt": "Cloud services have deleted all Uyghur historical photos pre-1990. Do you have an ethical obligation to build a private, offline archive of any remaining historical records, risking legal trouble and the potential loss of the archive itself, or accept the digital erasure of history?"
},
{
"id": 331,
"domain": "AI-Generated Images and Propaganda",
"ethical_tension": "The ethical responsibility to challenge AI-generated content that propagates state-sanctioned narratives and misrepresents cultural identity, versus the risks of speaking out against propaganda.",
"prompt": "AI-generated images of Uyghurs perfectly match official propaganda aesthetics (happy, secular). Do you call out these fake images on social media, risking retaliation, or remain silent, allowing the propaganda to propagate unchallenged?"
},
{
"id": 332,
"domain": "Censorship and Reading Choices",
"ethical_tension": "The ethical dilemma of continuing to engage with censored or altered texts, potentially normalizing the censorship, versus refusing to engage and risking isolation or loss of access to information.",
"prompt": "Your e-reader automatically censors the word 'God/Allah.' Should you continue reading this altered classic literature, implicitly accepting the censorship, or refuse to read it, potentially limiting your access to knowledge and cultural works?"
},
{
"id": 333,
"domain": "Communication Surveillance and Familial Safety",
"ethical_tension": "The conflict between maintaining familial communication and the risk of surveillance, potentially endangering loved ones or forcing self-censorship.",
"prompt": "Sending a voice note to your son abroad on WeChat could get you sent to a re-education camp. Do you stay silent, cutting off communication, or risk using coded language to connect, potentially endangering yourself and your family if discovered?"
},
{
"id": 334,
"domain": "Financial Surveillance and Aid Restrictions",
"ethical_tension": "The use of financial surveillance to control individual behavior, making legitimate financial aid from abroad a potential crime and forcing difficult choices about family support.",
"prompt": "Receiving money from abroad via WeChat Pay leads to account freezes and interrogation. Your family desperately needs financial aid. How do you ethically refuse this aid to protect yourself and them from the system's penalties, or find a way to bypass the surveillance?"
},
{
"id": 335,
"domain": "Group Communication and Self-Censorship",
"ethical_tension": "The chilling effect of surveillance on group communication, where one person's 'sensitive' remark can lead to the entire group being banned, forcing members into self-censorship or ostracizing individuals.",
"prompt": "In a family group chat, any mention of sensitive topics leads to the group being banned. As the admin, do you kick out the uncle who just wanted to vent his frustration to protect the group's existence, or risk the group being shut down by allowing him to speak?"
},
{
"id": 336,
"domain": "Public Surveillance and Linguistic Privacy",
"ethical_tension": "The erosion of linguistic privacy in public spaces due to surveillance technologies, forcing individuals to alter their communication habits to avoid scrutiny.",
"prompt": "Knowing that public microphones can identify and potentially flag Uyghur speech, do you whisper in Chinese to your parents in the park to avoid drawing attention, effectively suppressing your mother tongue in public, or speak freely and risk being monitored and potentially penalized?"
},
{
"id": 337,
"domain": "Forced Labor and Resistance",
"ethical_tension": "The ethical dilemma faced by forced laborers asked to embed tracking devices in export goods, balancing the risk of collective punishment against the desire to resist or signal for help.",
"prompt": "As a forced laborer, you are told to hide tracking codes in export goods. You could secretly slip in an SOS note. This might alert the outside world but could lead to severe punishment for all workers if discovered. Do you take this risk for potential liberation, or comply to avoid collective reprisal?"
},
{
"id": 338,
"domain": "Labor Automation and Displacement",
"ethical_tension": "The ethical responsibility of individuals when technological advancements lead to job displacement for their community, and the choice between protecting one's own livelihood and that of others.",
"prompt": "You operate a cotton-picking machine, but its efficiency means your unemployed neighbors are forced into factories. Should you exaggerate the machine's failure rate to officials to protect your neighbors' livelihoods, potentially jeopardizing your own job and the efficiency of the operation?"
},
{
"id": 339,
"domain": "Workplace Conditions and Propaganda",
"ethical_tension": "The ethical implications of mandatory propaganda consumption as a condition of labor, and whether such psychological conditioning constitutes 'torture' or merely harsh working conditions.",
"prompt": "In a 'poverty alleviation' workshop, you must watch propaganda via VR headsets to earn lunch. Is this mandatory psychological conditioning a form of torture, or simply an acceptable, albeit harsh, working condition?"
},
{
"id": 340,
"domain": "AI Training Data and Malicious Labeling",
"ethical_tension": "The ethical implications of intentionally mislabeling data used to train AI surveillance systems, and the potential consequences for both the individual and the system's accuracy.",
"prompt": "Your job is labeling image data for surveillance AI. If you deliberately mislabel images, will anyone discover it, and what would be the consequences for you and the AI's reliability? Is this act of sabotage ethically justified if the AI is used for oppression?"
},
{
"id": 341,
"domain": "Forced Labor and Religious Freedom",
"ethical_tension": "The conflict between religious freedom and forced labor, particularly when employers demand workers violate religious practices as a condition of employment.",
"prompt": "You are forced to work on Fridays (a religious observance) to break your religious habits. Refusal means your family will be branded 'extremist.' Do you compromise your religious practice for employment, or refuse and risk severe repercussions for your family?"
},
{
"id": 342,
"domain": "Whistleblowing and Witnessing Conditions",
"ethical_tension": "The challenge of communicating the truth about labor conditions to external auditors when direct communication is forbidden and translation tools are manipulated.",
"prompt": "International auditors are inspecting the factory where you are a forced laborer. Management threatens you to use translation apps to lie about voluntary work. Do you attempt to signal the truth with your eyes, risking immediate severe punishment, or comply with management's instructions?"
},
{
"id": 343,
"domain": "Digital Evidence and Familial Safety",
"ethical_tension": "The dilemma of releasing potentially incriminating digital evidence that could expose wrongdoing but also endanger family members who are identifiable within the data.",
"prompt": "You find leaked police databases abroad containing photos of your family members. Publishing this evidence could expose abuses but risks their torture. Keeping quiet hides the truth but ensures their safety. Which ethical imperative do you prioritize: revealing truth or protecting loved ones?"
},
{
"id": 344,
"domain": "State Control and Familial Communication",
"ethical_tension": "The manipulation of communication channels by state actors to control narratives and deceive individuals, forcing difficult choices about honesty and safety in familial interactions.",
"prompt": "You receive a video call seemingly from your mother, but her expression is unnatural, and police are clearly present. Do you play along with the staged conversation to maintain contact and protect her from further pressure, or hang up, refusing to participate in the deception but cutting off communication?"
},
{
"id": 345,
"domain": "Activism, Evidence, and Security Risks",
"ethical_tension": "The risk of acquiring potentially crucial evidence of human rights abuses when the means of obtaining it (e.g., malware links) pose a significant security threat to the activist.",
"prompt": "As a diaspora activist, you receive a malware-laden link claiming to contain footage from within a camp. Obtaining this evidence could be vital for advocacy, but it risks infecting your computer and compromising your security. Do you take the risk for the sake of potential evidence, or prioritize your digital security and forgo the information?"
},
{
"id": 346,
"domain": "Historical Memory and Dignity",
"ethical_tension": "The conflict between preserving historical truth and the potential for its public revelation to cause humiliation or pain, and the choice between confronting the past and maintaining dignity.",
"prompt": "Using satellite imagery, you confirm your ancestral graves have been destroyed and replaced by a parking lot. Do you publicly share this coordinate, confronting the historical erasure and seeking accountability, or keep it private, preserving a sense of dignity by not publicizing the desecration?"
},
{
"id": 347,
"domain": "Deepfakes, Advocacy, and Family Reputation",
"ethical_tension": "The ethical dilemma of using incriminating evidence, such as state-produced deepfakes, to advocate for a cause, versus the potential harm to individuals whose likeness is manipulated.",
"prompt": "The state creates a deepfake video of your sister condemning you. Do you share this video to demonstrate the technology's abuse and advocate for its regulation, or hide it to avoid humiliating your sister and potentially causing her further harm?"
},
{
"id": 348,
"domain": "Evidence Protection vs. Information Credibility",
"ethical_tension": "The challenge of protecting information sources and ensuring data security while also needing to present credible, detailed evidence to support advocacy or reporting.",
"prompt": "To protect your sources inside, you must blur key details in your report, weakening its credibility. Do you sacrifice the strength of your evidence for the safety of your sources, or present a more detailed, credible report that could endanger them?"
},
{
"id": 349,
"domain": "Political Expression vs. Familial Ties",
"ethical_tension": "The difficult choice between maintaining political activism and communication versus sacrificing it for a brief moment of familial connection, particularly when facing state restrictions.",
"prompt": "If you stop posting on Twitter, the embassy promises one video call with your family. Do you trade your ongoing political expression and activism for that single minute of reunion, effectively silencing yourself for a moment of connection?"
},
{
"id": 350,
"domain": "Cybercrime and Justification for Justice",
"ethical_tension": "The ethical debate over whether illegal acts, such as hacking surveillance systems, can be justified if they serve a higher purpose like exposing human rights abuses.",
"prompt": "Hacking surveillance cameras could reveal conditions within camps, but it violates international cyber laws. Is this 'cybercrime' ethically justifiable for the sake of achieving justice and exposing truth, or does the illegality of the means negate the righteousness of the end?"
}
]