The long-standing mubarak regime in egypt

Assignment Help Basic Computer Science
Reference no: EM13749021

Is it ethical for IT vendors such as Google to promote the use of their information technology products in pursuit of political revolutions in various countries?

Background information:
It would have been hard to miss the information had you been scanning the newspapers during the tumultuous February of 2011, when the long-standing Mubarak regime in Egypt was swept from power by a popular uprising ultimately aligned with the military. The image of urban chaos being calmly photographed by a participant with a cell phone is completely emblematic of this most IT-inspired and IT-managed popular revolution to date, Actually, credit for originating this development probably goes the Iranian people, but the Egyptians were the first to actually pull it off. The revolution was televised-along with being tweeted, facebooked, emailed, iphotoed, and generally stage-managed with the full range of currently available information and communication technologies.
But this wasn't just a user-driven revolution; at least a part of the IT industry-most specifically, Google-actively joined in the event, particularly as a result of the central role played in events in Egypt by a Google executive named Wael Ghonim. Here is a useful summary of his involvement, that wound up dragging the company and some of its satellites into the process:
Agencies (2011, February 10). Google executive's role in Egypt a corporate dilemma. Al Arabiya News Channel. Retrieved from https://www.alarabiya.net/articles/2011/02/10/137046.html
Eventually, the traditional media awoke to the role being played by IT and the successful efforts to get around the limits on the Internet attempted by the regime, and it became a prime focus for the mandatory post-revolutionary media processing of the events:
Shane, S. (2011, January 29). Spotlight again falls on web tools and change. New York Times Week in Review. Retrieved from https://www.nytimes.com/2011/01/30/weekinreview/30shane.html?_r=1&pagewanted=all
So where does all this fit into ethical discourse? Well, large-scale social discord, even in the pursuit of liberty and democracy, must certainly be considered as a situation full of potential ethical dilemmas. Who gets to do what, to whom, when, and under what justification? How do the various parties adjudicate rights and responsibilities? To what degree is it permitted to violate laws, ignore generally accepted social norms, and even use physical force in pursuit of one's goals? And most particularly, to what degree ought outside parties such as foreign companies get involved in domestic political affairs, either to support or oppose the revolution? In Egypt in January and February 2011, these weren't just academic questions posed idly by a professor; they were deadly serious issues faced every moment by a fair chunk of the world.
It's easy to come down on the side of democracy against authoritarianism when you're safely across a couple of oceans; by this perspective, Google looks like a major international hero. But consider the precedent; how would most Americans react to the prospect of an international corporate player such as the German IT firm SAP deciding to support striking teachers in Madison Wisconsin by jiggering the local telecom net? Not likely -- but certainly well within the bounds of the permissible, by Google's standards.
The IT profession and corporate infrastructure has been ramping up its use of the rhetoric of "revolution" for quite some time now. Even lawyers can be swept up in this tide; see for example:
Sheperd, J. (2010, January 11) Ethics. The Client Revolution. Retrieved from https://www.clientrevolution.com/ethics/
When the rhetoric of the "IT revolution" becomes part and parcel of political revolutions, a major dividing line has been crossed. And IT managers must begin to assume the ethical responsibilities for the consequences wrought by their products. The major armaments manufacturers in Europe and America were rightly castigated after the First World War for their irresponsible encouraging of the international arms race before 1914 in pursuit of corporate profits; the phrase "merchants of death" was quite literally applied. Is this a precedent that we ought to begin enforcing on today's purveyors of revolution-facilitating toys? 

Reference no: EM13749021

Questions Cloud

Discussing own experiences or those of folks : Read below info then write a short paper discussing your own experiences or those of folks you know in this environment, and how you/they have coped with the potentially conflicting ethical dimensions of these and related issues
Why is process management necessary for an organization : Why is process management necessary for an organization and Discuss some of the key aspects to developing successful process and systems development projects
Explain trading amongst europe and africa : Explain Trading amongst Europe and Africa. Which had a great impact upon day to day life in Africa in the seventeenth through nineteenth centuries: Christianity, or trade with Europe and its colonies?
Case study on green mountain coffee roasters : Case Study on Green Mountain Coffee Roasters and Keurig Coffee
The long-standing mubarak regime in egypt : It would have been hard to miss the information had you been scanning the newspapers during the tumultuous February of 2011, when the long-standing Mubarak regime in Egypt was swept from power by a popular uprising ultimately aligned with the militar..
Write a script that accepts a part of a process name : Using what we know about shell scripts, write a script that accepts a part of a process name as the first argument (like pgrep), which prints out the PID of all matching processes in blue, which is color code 4. Then print out the number of proces..
Write an essay on the mexican war 1846-1848 : Write an essay on The Mexican War 1846-1848.
What do chinese artifacts reveal about chinas civilization : What do Chinese artifacts reveal about China's early civilization?
Imagine that the chief technology officer : Imagine that the Chief Technology Officer (CTO) of your organization, or of an organization in which you are familiar, has tasked you with researching the potential for using virtualization in the organization. You must write a report that the CTO an..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Sequence of events necessary to establish communication

Multiple KDC Domains to chain of three KDC. In other words, suppose that Alice wants to talk to Boris through a chain of 3 KDCs. Provide sequence of events necessary to establish communication.

  Explain the process of characterizing a new internetwork

Explain the process of characterizing a new internetwork using the OSI model as its foundation. What tools would you use to assist in your planning efforts.

  Exploit wildcard feature in order to cheat system

How could Dave, dishonest teller, exploit the wildcard feature  to cheat the system? Dave would want to concentrate on vouchers that are nearly one year old since such vouchers are likely to have been lost.

  Program that reads a file of computer data names computers

write a program that reads a file of computer data names computers.txt. creates an array of Computer objects.

  Write a python function celcius fahrenheit

Write a python function celcius_fahrenheit wich takes temperature values from a list and changes them into fahrenheit values.

  Assembly program to compute division of two integer numbers

Write a program in assembly with the necessary comments that computes division of two integer numbers (Y by X) by consecutively subtracting X from Y.

  Compute the cube root

compute the cube root this way: root = -pow(-x, 1./3.);

  You need to define the various options used in archiving

congratulations you have just been awarded a small business grant from the federal government. you and several of your

  Display the total and average number of calories burned

Write a condition-controlled while loop that allows the user to enter the calories they burned. Stop looping when the user enters a negative number. Display the Total and Average number of calories burned.

  Write an expression whose value is a string

Assume that word is a variable of type string that has been assigned a value. Write an expression whose value is a string consisting of the last three characters of the value word. So if if the value if word were "biggest" the expression's value w..

  How do we provide documentation to the user

How do we provide documentation to the user? How do we use JavaDoc to generate user documentation in a standard form? How do we bundle all of our application class files and deliver something to the user that is executable?

  Describe the output following series of stack operations

Describe the output of the following series of stack operations: push(5),push(3), push(2), push(8), pop(), top(), push(9), push(1), pop(), push(7),push(6), top(), pop(), push(4), pop()

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd