The long-standing mubarak regime in egypt

Assignment Help Basic Computer Science
Reference no: EM13749021

Is it ethical for IT vendors such as Google to promote the use of their information technology products in pursuit of political revolutions in various countries?

Background information:
It would have been hard to miss the information had you been scanning the newspapers during the tumultuous February of 2011, when the long-standing Mubarak regime in Egypt was swept from power by a popular uprising ultimately aligned with the military. The image of urban chaos being calmly photographed by a participant with a cell phone is completely emblematic of this most IT-inspired and IT-managed popular revolution to date, Actually, credit for originating this development probably goes the Iranian people, but the Egyptians were the first to actually pull it off. The revolution was televised-along with being tweeted, facebooked, emailed, iphotoed, and generally stage-managed with the full range of currently available information and communication technologies.
But this wasn't just a user-driven revolution; at least a part of the IT industry-most specifically, Google-actively joined in the event, particularly as a result of the central role played in events in Egypt by a Google executive named Wael Ghonim. Here is a useful summary of his involvement, that wound up dragging the company and some of its satellites into the process:
Agencies (2011, February 10). Google executive's role in Egypt a corporate dilemma. Al Arabiya News Channel. Retrieved from https://www.alarabiya.net/articles/2011/02/10/137046.html
Eventually, the traditional media awoke to the role being played by IT and the successful efforts to get around the limits on the Internet attempted by the regime, and it became a prime focus for the mandatory post-revolutionary media processing of the events:
Shane, S. (2011, January 29). Spotlight again falls on web tools and change. New York Times Week in Review. Retrieved from https://www.nytimes.com/2011/01/30/weekinreview/30shane.html?_r=1&pagewanted=all
So where does all this fit into ethical discourse? Well, large-scale social discord, even in the pursuit of liberty and democracy, must certainly be considered as a situation full of potential ethical dilemmas. Who gets to do what, to whom, when, and under what justification? How do the various parties adjudicate rights and responsibilities? To what degree is it permitted to violate laws, ignore generally accepted social norms, and even use physical force in pursuit of one's goals? And most particularly, to what degree ought outside parties such as foreign companies get involved in domestic political affairs, either to support or oppose the revolution? In Egypt in January and February 2011, these weren't just academic questions posed idly by a professor; they were deadly serious issues faced every moment by a fair chunk of the world.
It's easy to come down on the side of democracy against authoritarianism when you're safely across a couple of oceans; by this perspective, Google looks like a major international hero. But consider the precedent; how would most Americans react to the prospect of an international corporate player such as the German IT firm SAP deciding to support striking teachers in Madison Wisconsin by jiggering the local telecom net? Not likely -- but certainly well within the bounds of the permissible, by Google's standards.
The IT profession and corporate infrastructure has been ramping up its use of the rhetoric of "revolution" for quite some time now. Even lawyers can be swept up in this tide; see for example:
Sheperd, J. (2010, January 11) Ethics. The Client Revolution. Retrieved from https://www.clientrevolution.com/ethics/
When the rhetoric of the "IT revolution" becomes part and parcel of political revolutions, a major dividing line has been crossed. And IT managers must begin to assume the ethical responsibilities for the consequences wrought by their products. The major armaments manufacturers in Europe and America were rightly castigated after the First World War for their irresponsible encouraging of the international arms race before 1914 in pursuit of corporate profits; the phrase "merchants of death" was quite literally applied. Is this a precedent that we ought to begin enforcing on today's purveyors of revolution-facilitating toys? 

Reference no: EM13749021

Questions Cloud

Discussing own experiences or those of folks : Read below info then write a short paper discussing your own experiences or those of folks you know in this environment, and how you/they have coped with the potentially conflicting ethical dimensions of these and related issues
Why is process management necessary for an organization : Why is process management necessary for an organization and Discuss some of the key aspects to developing successful process and systems development projects
Explain trading amongst europe and africa : Explain Trading amongst Europe and Africa. Which had a great impact upon day to day life in Africa in the seventeenth through nineteenth centuries: Christianity, or trade with Europe and its colonies?
Case study on green mountain coffee roasters : Case Study on Green Mountain Coffee Roasters and Keurig Coffee
The long-standing mubarak regime in egypt : It would have been hard to miss the information had you been scanning the newspapers during the tumultuous February of 2011, when the long-standing Mubarak regime in Egypt was swept from power by a popular uprising ultimately aligned with the militar..
Write a script that accepts a part of a process name : Using what we know about shell scripts, write a script that accepts a part of a process name as the first argument (like pgrep), which prints out the PID of all matching processes in blue, which is color code 4. Then print out the number of proces..
Write an essay on the mexican war 1846-1848 : Write an essay on The Mexican War 1846-1848.
What do chinese artifacts reveal about chinas civilization : What do Chinese artifacts reveal about China's early civilization?
Imagine that the chief technology officer : Imagine that the Chief Technology Officer (CTO) of your organization, or of an organization in which you are familiar, has tasked you with researching the potential for using virtualization in the organization. You must write a report that the CTO an..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Processes and procedural considerations for implementing

Following on from the previous assignment, the CIO was comfortable with what has been proposed by you in the first assignment and would like to see three key elements be investigated and reported further in this assignment.

  The payroll manager for your employer

You are the Payroll Manager for your employer. Your payroll clerk has submitted the worksheet displayed here. All employees earn their regular pay rate times the hours worked plus an overtime bonus of 50% of the hours worked in excess of 40 hou..

  What is the value of the key and the new register

In the n-stage nonlinear feedback shift register (NLFSR), if the current register is 0010, function f is f(R3, R2, R1, R0) = R3 or R2 or R1 or R0,what is the value of the key and the new register?

  Automate the entry and updating of routing information

Automate the entry and updating of routing information, but you are concerned about excessive memory and processor utilization if you implement dynamic routing protocols.

  Write a boolean method

A random walk begins at a point and repeatedly takes a step in a randomly chosen direction. In our version, the random walk will start at the center of a circle and continue until it goes outside the circle.

  Write an output statement that displays the memory location

Write an output statement that displays the memory location of the value 4 stored in intArray[] in base-16 integer format.

  Describe a violation of opsec principles

Describe a violation of OPSEC principles that plays a major role in the plot of a movie you have seen, then describe briefly how the 5 step process.

  Explaining formal risk assessment of desktop systems

As apart of a formal risk assessment of desktop systems in small accounting firm with limited IT Support, you have identified asset "integrity of customer and financial data files on desktop systems" and threat.

  Strategic advantages voip brings to businesses

Write down some of the strategic advantages the VoIP brings to businesses that adopt it? Prior, voice and data networks were separate and typically maintained by separate groups.

  Use the supplied superclass car to create classes

Because Toyotas are superior to Fords or Chevys it should also implement the supplied Airplane interface. Give the methods something to do. I would suggest a println method since you can then see that the method actually ran.

  Compute the cost of sorting the relation in seconds

Suppose a flash storage device is used instead of disk, and it has a seek time of 1 microsecond and a transfer rate of 40 MB per second. Recompute the cost of sorting the relation in seconds with.

  Peak view sound sources is a public company

Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and i..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd