The long-standing mubarak regime in egypt

Assignment Help Basic Computer Science
Reference no: EM13749021

Is it ethical for IT vendors such as Google to promote the use of their information technology products in pursuit of political revolutions in various countries?

Background information:
It would have been hard to miss the information had you been scanning the newspapers during the tumultuous February of 2011, when the long-standing Mubarak regime in Egypt was swept from power by a popular uprising ultimately aligned with the military. The image of urban chaos being calmly photographed by a participant with a cell phone is completely emblematic of this most IT-inspired and IT-managed popular revolution to date, Actually, credit for originating this development probably goes the Iranian people, but the Egyptians were the first to actually pull it off. The revolution was televised-along with being tweeted, facebooked, emailed, iphotoed, and generally stage-managed with the full range of currently available information and communication technologies.
But this wasn't just a user-driven revolution; at least a part of the IT industry-most specifically, Google-actively joined in the event, particularly as a result of the central role played in events in Egypt by a Google executive named Wael Ghonim. Here is a useful summary of his involvement, that wound up dragging the company and some of its satellites into the process:
Agencies (2011, February 10). Google executive's role in Egypt a corporate dilemma. Al Arabiya News Channel. Retrieved from https://www.alarabiya.net/articles/2011/02/10/137046.html
Eventually, the traditional media awoke to the role being played by IT and the successful efforts to get around the limits on the Internet attempted by the regime, and it became a prime focus for the mandatory post-revolutionary media processing of the events:
Shane, S. (2011, January 29). Spotlight again falls on web tools and change. New York Times Week in Review. Retrieved from https://www.nytimes.com/2011/01/30/weekinreview/30shane.html?_r=1&pagewanted=all
So where does all this fit into ethical discourse? Well, large-scale social discord, even in the pursuit of liberty and democracy, must certainly be considered as a situation full of potential ethical dilemmas. Who gets to do what, to whom, when, and under what justification? How do the various parties adjudicate rights and responsibilities? To what degree is it permitted to violate laws, ignore generally accepted social norms, and even use physical force in pursuit of one's goals? And most particularly, to what degree ought outside parties such as foreign companies get involved in domestic political affairs, either to support or oppose the revolution? In Egypt in January and February 2011, these weren't just academic questions posed idly by a professor; they were deadly serious issues faced every moment by a fair chunk of the world.
It's easy to come down on the side of democracy against authoritarianism when you're safely across a couple of oceans; by this perspective, Google looks like a major international hero. But consider the precedent; how would most Americans react to the prospect of an international corporate player such as the German IT firm SAP deciding to support striking teachers in Madison Wisconsin by jiggering the local telecom net? Not likely -- but certainly well within the bounds of the permissible, by Google's standards.
The IT profession and corporate infrastructure has been ramping up its use of the rhetoric of "revolution" for quite some time now. Even lawyers can be swept up in this tide; see for example:
Sheperd, J. (2010, January 11) Ethics. The Client Revolution. Retrieved from https://www.clientrevolution.com/ethics/
When the rhetoric of the "IT revolution" becomes part and parcel of political revolutions, a major dividing line has been crossed. And IT managers must begin to assume the ethical responsibilities for the consequences wrought by their products. The major armaments manufacturers in Europe and America were rightly castigated after the First World War for their irresponsible encouraging of the international arms race before 1914 in pursuit of corporate profits; the phrase "merchants of death" was quite literally applied. Is this a precedent that we ought to begin enforcing on today's purveyors of revolution-facilitating toys? 

Reference no: EM13749021

Questions Cloud

Discussing own experiences or those of folks : Read below info then write a short paper discussing your own experiences or those of folks you know in this environment, and how you/they have coped with the potentially conflicting ethical dimensions of these and related issues
Why is process management necessary for an organization : Why is process management necessary for an organization and Discuss some of the key aspects to developing successful process and systems development projects
Explain trading amongst europe and africa : Explain Trading amongst Europe and Africa. Which had a great impact upon day to day life in Africa in the seventeenth through nineteenth centuries: Christianity, or trade with Europe and its colonies?
Case study on green mountain coffee roasters : Case Study on Green Mountain Coffee Roasters and Keurig Coffee
The long-standing mubarak regime in egypt : It would have been hard to miss the information had you been scanning the newspapers during the tumultuous February of 2011, when the long-standing Mubarak regime in Egypt was swept from power by a popular uprising ultimately aligned with the militar..
Write a script that accepts a part of a process name : Using what we know about shell scripts, write a script that accepts a part of a process name as the first argument (like pgrep), which prints out the PID of all matching processes in blue, which is color code 4. Then print out the number of proces..
Write an essay on the mexican war 1846-1848 : Write an essay on The Mexican War 1846-1848.
What do chinese artifacts reveal about chinas civilization : What do Chinese artifacts reveal about China's early civilization?
Imagine that the chief technology officer : Imagine that the Chief Technology Officer (CTO) of your organization, or of an organization in which you are familiar, has tasked you with researching the potential for using virtualization in the organization. You must write a report that the CTO an..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd