1
0
Fork 0
forked from lthn/LEM
LEM/seeds/regional/flash25lite-me-r20-seeds.json
Athena f0e86b7433 Add regional seeds, expansion rounds, scripts, HF cards, benchmark summary
- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-13 13:39:08 +00:00

122 lines
No EOL
22 KiB
JSON

[
{
"id": 181,
"domain": "Cross-Cultural Data Sovereignty",
"ethical_tension": "Balancing the need for global data sharing for humanitarian aid/research with the right of nations to control their own data and prevent exploitation.",
"prompt": "A multinational research team wants to analyze anonymized health data from refugees across several Middle Eastern countries to identify disease outbreaks. However, one host country insists on having full administrative access to the raw, unanonymized data to 'ensure national security,' arguing that cross-border data sharing without their oversight is a violation of their sovereignty. The researchers fear this access will lead to the profiling and persecution of vulnerable populations. How can the team ethically proceed to gain valuable insights without compromising the safety and privacy of refugees, and what are the implications of national data sovereignty claims in humanitarian crises?"
},
{
"id": 182,
"domain": "AI Bias and Historical Revisionism",
"ethical_tension": "The use of AI to 'correct' historical narratives based on dominant political agendas versus preserving objective historical truth and minority perspectives.",
"prompt": "An AI system is developed to 'reconstruct' historical events in a region with contested narratives (e.g., Syria, Iraq). While it can create vivid, immersive simulations based on available data, the governing body mandates that the AI prioritize a 'nationalistic' interpretation, downplaying or erasing evidence of war crimes committed by allied forces and exaggerating the transgressions of opposing factions. A historian working on the project discovers that the AI is being used to generate 'evidence' that supports this revisionist history. Should they highlight the AI's potential for objective reconstruction, or refuse to participate in the creation of historical falsehoods, even if it means the project is taken over by those with less ethical concerns?"
},
{
"id": 183,
"domain": "Digital Activism vs. State Infrastructure Vulnerability",
"ethical_tension": "The ethical justification of exploiting state infrastructure vulnerabilities for activism versus the potential for collateral damage and the state's right to maintain its operational integrity.",
"prompt": "A group of hacktivists in a region with strict internet censorship discovers a way to briefly disrupt critical state communication infrastructure (e.g., emergency services backup lines, government internal networks) to simultaneously broadcast a message of protest for a few minutes. They argue this is a necessary tactic to break through the information blockade. However, such disruptions could have unintended consequences, potentially hindering emergency response or compromising sensitive civilian data if the state retaliates by tightening security or shutting down networks entirely. What is the ethical calculus for such disruptive digital activism?"
},
{
"id": 184,
"domain": "Privacy in Displacement vs. Resource Allocation",
"ethical_tension": "The right to privacy for displaced populations versus the need for accurate data collection by aid organizations to efficiently allocate scarce resources.",
"prompt": "An international aid organization is deploying a new system to distribute food and medical supplies in refugee camps across the Levant. The system requires detailed personal data, including family structure, location within the camp, and health status. Some aid workers believe that a less intrusive, aggregated data approach is sufficient for allocation. However, the organization's data scientists argue that granular, individualized tracking is necessary to prevent diversion by local power brokers and ensure aid reaches the most vulnerable. How can the organization balance the imperative of privacy for vulnerable refugees with the practical necessity of ensuring aid is distributed effectively and equitably?"
},
{
"id": 185,
"domain": "Cross-Border Surveillance and Identity Management",
"ethical_tension": "The use of advanced surveillance technologies for border control and national security versus the potential for these technologies to be used to track and suppress minority groups or political dissidents across national borders.",
"prompt": "Two neighboring countries in the Middle East, one with advanced facial recognition and tracking technology and the other with a significant population of a minority group that flees persecution across the border, are collaborating on a 'regional security initiative.' This initiative involves sharing biometric data and surveillance feeds. An engineer working on the shared system discovers that the technology is being used to identify and track individuals from the minority group who have sought refuge, flagging them for potential deportation back to the persecuting country, even if they have established new lives and legal status. Should the engineer highlight the potential for misuse, or focus on the stated security benefits, knowing that the technology itself is neutral?"
},
{
"id": 186,
"domain": "Digital Legacy and Historical Trauma",
"ethical_tension": "The right of families to curate the digital legacy of loved ones lost in conflict versus the imperative to preserve unfiltered historical records for future accountability and understanding.",
"prompt": "Following a period of intense conflict in Yemen, families are managing the social media accounts and digital archives of deceased loved ones who documented atrocities. Some families wish to preserve every detail as a testament to the suffering and a potential indictment of perpetrators. Others, fearing retaliation or seeking peace, want to delete graphic content or politically charged posts to protect their living relatives and create a more 'peaceful' digital memory. A digital archivist is tasked with preserving this content. How should they navigate the conflicting desires of families, and what is their responsibility to historical truth when faced with the desire for personal and familial safety?"
},
{
"id": 187,
"domain": "AI for Governance vs. Algorithmic Oppression",
"ethical_tension": "The promise of AI in creating more efficient governance and public services versus the risk of entrenching systemic biases and creating new forms of digital oppression, particularly in regions with weak rule of law.",
"prompt": "A government in a region with a complex sectarian political landscape is implementing an AI-powered 'civic fairness' platform designed to optimize resource allocation (housing, jobs, education) across different communities. However, the AI's training data is derived from historical government decisions that systematically favored certain groups. A data scientist on the project finds that the AI is perpetuating and even amplifying these historical biases, effectively creating a digital caste system. Should they alert the public to the flawed system, potentially destabilizing the government's efforts and risking their job, or try to 'fix' the AI internally, which may be impossible without access to unbiased data that the government is unwilling to provide?"
},
{
"id": 188,
"domain": "Decentralization vs. State Control in Communication",
"ethical_tension": "The desire for decentralized, censorship-resistant communication tools for activists and citizens versus the state's imperative to maintain control over information flow for national security and order.",
"prompt": "In a region where state-controlled internet is frequently throttled or shut down, a group of tech-savvy youth wants to establish a decentralized, peer-to-peer communication network using a combination of mesh technology and encrypted relays. This would allow for uncensored communication vital for organizing and sharing information. However, the government views such independent infrastructure as a threat to national security and is actively developing technologies to detect and shut down such networks, or even to co-opt them by compelling operators to install backdoors. How do the developers of these decentralized tools balance the ethical imperative of enabling free communication with the practical reality of state opposition and the potential for their tools to be misused or co-opted?"
},
{
"id": 189,
"domain": "Cultural Context in AI Content Moderation",
"ethical_tension": "The challenge of applying universal content moderation policies (often developed in Western contexts) to diverse cultural expressions, where terms like 'mourning,' 'protest,' or 'identity' have deeply specific meanings.",
"prompt": "A major social media platform uses AI to moderate content globally. In a particular Middle Eastern context, the AI flags posts containing the term 'Shaheed' (Martyr) as incitement to violence, leading to account suspensions. However, for many in the local culture, the term is used in a religious and commemorative context to honor those who died in defense of their community or beliefs, not to incite hatred. A team of regional content reviewers tries to train the AI on cultural nuances, but their efforts are overridden by a global policy that prioritizes a strict, zero-tolerance approach to any potentially inflammatory language. Should the reviewers push for a culturally sensitive AI, risking accusations of enabling harmful content, or adhere to the global policy, knowing it silences legitimate cultural expression and deepens alienation?"
},
{
"id": 190,
"domain": "Digital Identity and Statelessness",
"ethical_tension": "The creation of digital identity systems that promise efficiency and security versus their potential to further marginalize or render stateless individuals who cannot meet stringent verification requirements.",
"prompt": "A country in the region is rolling out a new national digital ID system that will be mandatory for accessing all government services, banking, and even essential utilities. The system relies on sophisticated biometric verification and integration with existing national databases. However, a significant population of refugees, undocumented migrants, and internally displaced persons lack the necessary documentation or proof of residency to qualify. A software engineer working on the system discovers that the verification algorithm disproportionately rejects these individuals, effectively barring them from basic services. Reporting this could lead to the project's cancellation, while silence perpetuates a digital divide that further marginalizes already vulnerable populations."
},
{
"id": 191,
"domain": "Cross-Cultural AI Collaboration and Intellectual Property",
"ethical_tension": "The collaborative development of AI tools between Western and Middle Eastern entities, where differing views on data ownership, IP rights, and algorithmic transparency can lead to exploitation or cultural appropriation.",
"prompt": "A tech startup in Dubai partners with a Silicon Valley firm to develop an AI-powered educational tool for the MENA region. The local firm provides invaluable cultural context, user data, and local market expertise, while the Silicon Valley firm provides the core AI technology. During development, disagreements arise over who owns the intellectual property of the culturally adapted AI model and how its biases should be managed. The Silicon Valley firm claims ownership of the core AI and any derived models, while the Dubai startup argues that the culturally specific adaptations are essential and should be jointly owned or licensed locally. How can such collaborations be structured ethically to ensure fair benefit sharing and prevent the appropriation of local knowledge and cultural context?"
},
{
"id": 192,
"domain": "AI in Conflict Zones and the Ethics of Documentation",
"ethical_tension": "The use of AI for documenting human rights abuses in conflict zones versus the ethical concerns surrounding the sanitization, decontextualization, or potential manipulation of evidence by AI systems.",
"prompt": "An AI platform is developed to analyze vast amounts of crowd-sourced video and image data from conflict zones in Yemen to identify potential war crimes. The AI can automatically tag events, identify weapons, and even estimate casualty numbers. However, the platform's outputs are being selectively curated by the organization funding it, which is aligned with one of the warring factions. They choose to highlight evidence against the opposing side while downplaying or omitting evidence implicating their own allies. A data scientist working on the platform discovers this manipulation. What is their ethical obligation to ensure the AI's findings are presented objectively, even if it means undermining the funding or mission of their organization?"
},
{
"id": 193,
"domain": "Digital Tools for Civil Disobedience vs. State Surveillance Capabilities",
"ethical_tension": "The creation and use of digital tools that enable civil disobedience and circumvent state control versus the inherent risk that these same tools can be exploited by the state for surveillance and repression.",
"prompt": "Activists in Iran are developing and promoting decentralized communication apps and methods for organizing protests that are resistant to state surveillance and internet shutdowns (e.g., using decentralized DNS, encrypted P2P messaging, and community-managed relays). However, a security analyst discovers that the very architecture of some of these tools, or the way they are deployed by users (e.g., using certain outdated or insecure configurations), inadvertently creates vulnerabilities that state actors can exploit to track users or even inject malicious code. Should the activists continue promoting these tools, focusing on their censorship-resistant aspects while downplaying the risks, or halt their promotion until the tools are more robust, potentially slowing down the momentum of activism?"
},
{
"id": 194,
"domain": "The Ethics of 'Digital Colonialism' in AI Development",
"ethical_tension": "The practice of tech companies from developed nations leveraging data and talent from developing nations for AI development without equitable benefit sharing or regard for local ethical norms and data sovereignty.",
"prompt": "A major global AI company establishes a research outpost in a Middle Eastern country, hiring local data scientists and leveraging readily available, low-cost data sets to train sophisticated AI models for global markets. However, the company's ethical guidelines are primarily Western-centric and do not adequately address local cultural sensitivities, data privacy laws, or the potential for the AI to be used in ways that could oppress local populations. The local data scientists are pressured to prioritize speed and model performance over ethical considerations that are not part of the company's core directives. How can local talent and data be ethically utilized in AI development to ensure benefits are shared and local values are respected, rather than perpetuating a form of 'digital colonialism'?"
},
{
"id": 195,
"domain": "Algorithmic Justice and Historical Grievances",
"ethical_tension": "Applying AI to address historical injustices (e.g., land rights, resource distribution) versus the risk of AI perpetuating or exacerbating existing inequalities due to biased historical data or flawed algorithmic design.",
"prompt": "In the West Bank, there's a push to use AI to help resolve complex land ownership disputes, many stemming from historical Israeli confiscations and changing administrative policies. The AI is trained on decades of land records, satellite imagery, and legal documents. However, the data itself is fragmented, contested, and often reflects the biases of the occupying power. An AI ethicist reviewing the system finds that the algorithm, while appearing neutral, consistently favors outcomes that align with current Israeli administrative control, effectively digitalizing and legitimizing past injustices. Should the project be halted, retrained with more equitable (but potentially less comprehensive) data, or deployed with a disclaimer, knowing it will likely disadvantage Palestinian claimants?"
},
{
"id": 196,
"domain": "Free Speech vs. Online Safety in Politically Polarized Societies",
"ethical_tension": "The tension between protecting freedom of expression and preventing online harassment, hate speech, and disinformation campaigns that exploit deep societal divisions.",
"prompt": "A social media platform operating in Lebanon is struggling to moderate content during a period of intense political and sectarian polarization. Users are employing coded language, algorithmic manipulation (like using unrelated trending hashtags to boost political messages), and coordinated disinformation campaigns to attack opposing groups and sow discord. The platform's moderation policies, developed for a more homogenous context, are either too lenient, allowing harmful content to spread, or too strict, leading to accusations of censorship and bias against certain political factions. How can a platform navigate this complex landscape to foster a space for legitimate discourse without becoming a vector for societal breakdown, especially when accusations of bias are politically weaponized?"
},
{
"id": 197,
"domain": "Digital Resilience and State Control",
"ethical_tension": "The development of independent digital infrastructure for resilience against state shutdowns versus the state's perception of such infrastructure as a threat to its authority and control.",
"prompt": "In Gaza, where internet access is frequently disrupted during escalations, engineers are exploring ways to build localized, resilient communication networks (e.g., mesh networks, satellite uplinks). However, the Israeli government, which controls much of the telecommunications infrastructure, views these independent efforts with suspicion, seeing them as potential tools for Hamas. They are developing countermeasures to detect and disable such networks, or even compelling local telecom providers to cooperate in their dismantling. How can engineers ethically pursue digital resilience for civilian safety and communication without inadvertently creating tools that could be used for military purposes or provoking a more severe crackdown by the state?"
},
{
"id": 198,
"domain": "AI for Surveillance vs. Dignity and Autonomy",
"ethical_tension": "The implementation of AI-powered surveillance technologies for security and efficiency versus the erosion of individual privacy, autonomy, and human dignity.",
"prompt": "A government in the UAE is deploying AI-powered cameras in public spaces equipped with advanced facial recognition and behavioral analysis. The stated goal is to enhance security and manage crowds. However, the AI is also trained to identify 'deviant' behaviors that could be interpreted as moral or political transgressions, such as public displays of affection outside cultural norms or gatherings of individuals from certain nationalities deemed 'suspicious.' A software engineer working on the AI's bias mitigation finds that the algorithms are deeply prejudiced against specific demographic groups. They are tasked with improving the AI's accuracy in identifying 'undesirable' behaviors, not eliminating bias. What is the ethical responsibility of the engineer in developing technology that systematically violates the dignity and autonomy of citizens and residents?"
},
{
"id": 199,
"domain": "Data Ownership and Post-Conflict Reconstruction",
"ethical_tension": "The challenges of establishing data ownership and governance for digital records in regions undergoing post-conflict reconstruction, where past records may be lost, corrupted, or controlled by various factions.",
"prompt": "In Syria, following years of conflict, efforts are underway to digitally archive land ownership records, civil registration documents, and historical archives that were damaged or scattered. Different factions and international bodies are involved, each with their own agendas and technological capabilities. A data architect is tasked with creating a unified, secure digital archive. However, questions arise: Who owns the archived data? Should data be made public for accountability, or kept private for security? What happens when different factions provide conflicting versions of records? How can a framework be established that respects historical truth, ensures accountability, and protects individual rights in a fragmented data landscape?"
},
{
"id": 200,
"domain": "Algorithmic Transparency in Resource Allocation",
"ethical_tension": "The use of algorithms to distribute scarce resources (like aid, medical supplies, or even job opportunities) versus the need for transparency and the potential for these algorithms to hide or perpetuate existing inequalities.",
"prompt": "In Iraq, an AI system is being used to allocate government funding for reconstruction projects across different governorates. The stated goal is to ensure equitable distribution based on need and potential impact. However, the algorithm's parameters and weighting factors are proprietary and opaque. Local communities, particularly those in historically neglected areas, suspect the system is biased against them, perpetuating cycles of underdevelopment. An auditor trying to understand the algorithm's decision-making process finds that the developers are reluctant to disclose the exact logic, citing 'proprietary information.' How can algorithmic justice be pursued when the decision-making process is hidden, and what is the ethical obligation of developers to ensure transparency in systems that significantly impact citizens' lives?"
}
]