THE GREEN DAM CYBER-CENSOR CASE Software designers, systems administrators, systems analysts, and computing and informatics experts in general face a rising number of potential ethical concerns as technology and globalization become more widespread and complicated.  Instructions: Read the case introduction below and then, depending on your interests, search for the listed resources for additional in-depth information that would help you to answer the case study. Case Introduction: Internet Cafe in China On June 9, 2009, the People's Republic of China's Ministry of Industry and Information Technology (MIIT) issued a directive stating that, starting July 1, 2009, all computers sold in Green Dam Girl China must include Green Dam Youth Escort software, an internet filtering program that restricts access to objectionable material using a combination of keyword search restrictions and content filtering. There is concern that the software may be used by the government to monitor all internet activity, and that it could even be used to intrude on people's privacy in other ways. The Ministry claimed that the Green Dam requirement was designed to keep children away from violent and pornographic websites, but critics claimed that the requirement represented a broad form of Chinese government monitoring and censorship of internet use and content, including politically sensitive material. Only 20 days remained until the mandate took effect when the official regulation was announced, limiting time for public debate and causing logistical challenges for PC manufacturers. RESOURCES FOR MORE IN-DEPTH INFORMATION ON THE CASE: The Green Dam Cyber-Censor Case Primary Articles/Links 1. The Wikipedia page on the "Green Dam Youth Escort" has a reasonable overview. 2. What types of internet content are blocked in China? 3. Empirical Analysis of Internet Filtering in China   Have there been other attempts to censor internet content or monitor use in China? 1. Skype admits to storing China text messages 2. China Censors: The Tiananmen Square Anniversary Will Not Be Tweeted 3. Google censors itself for China 4. Yahoo 'Strictest' Censor in China ASSIGNMENT QUESTIONS Consider this scenario: Instead of the Green Dam Escort project, the Chinese government hires a huge international Namibian-based company to develop its compulsory internet browser program. The project is top-secret, and even the programmers aren't sure what it'll be used for. Meanwhile, you're working for Microsoft Inc. on a top-secret project in which code is divided into teams working on modules, and team members are kept in the dark regarding the whole application's functionality and purpose. You have a feeling it's a military effort, but you're not certain. Consider the possibilities below. Question 1: Virtue Theory [50 marks] You're concerned that the software module you're developing could be utilized by the government (or military) to track citizen internet usage. Such government invasion of privacy runs counter to your ideals and ethics, but it's just a hunch thus far. You tried to bring up this topic with your boss in an oblique way but were told that it was not your job nor your concern to consider the big picture—"just keep doing your work well as you have been, and don't worry about it." You want to retain your good connection with your boss because you've heard through others that if he doesn't like you, he can be a difficult guy to work for. Then you hear on Public Radio about a news leak that describes China's Cyber-Sensor software mandate. The goals of regulating and monitoring citizen internet use are mentioned, but there are few details, and the news leak does not specify which software company is involved. You understand the project you're working on is maybe the one referenced. There are two reasons for you to be concerned about this software project right now. You start to wonder why a few of your coworkers were recently fired—was it because they started asking questions? You have a family to support and fantastic options for shares in the company that you would lose if you were fired. Using the virtue theory: a. What would you do? b. What are your options? c. What are the pros and cons of the various options at your disposal? d. What informal criteria or principles do you use when weighing the pros and cons like this Question 2: Utilitarian Theory [50 marks] Organizations and governments have good reasons to monitor their employees' and citizens' behavior. They're worried about gaining a competitive advantage, sabotage, and spying; trade, diplomatic, or military secrets; national/corporate security breaches; and worker productivity. Nonetheless, in democratic countries, privacy and freedom of expression are fundamental virtues. Using the utilitarian Theory: a. What are your thoughts on how the interests can and should be balanced? b. What procedures or safeguards should be put in place? c. If possible, give an example context (real or hypothetical.

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Chapter4: Programs And Apps: Productivity, Graphics, Security, And Other Tools
Section: Chapter Questions
Problem 4IR
icon
Related questions
Question

THE GREEN DAM CYBER-CENSOR CASE

Software designers, systems administrators, systems analysts, and computing and informatics experts in general face a rising number of potential ethical concerns as technology and globalization become more widespread and complicated. 

Instructions:

Read the case introduction below and then, depending on your interests, search for the listed resources for additional in-depth information that would help you to answer the case study.

Case Introduction:

Internet Cafe in China On June 9, 2009, the People's Republic of China's Ministry of Industry and Information Technology (MIIT) issued a directive stating that, starting July 1, 2009, all computers sold in Green Dam Girl China must include Green Dam Youth Escort software, an internet filtering program that restricts access to objectionable material using a combination of keyword search restrictions and content filtering. There is concern that the software may be used by the government to monitor all internet activity, and that it could even be used to intrude on people's privacy in other ways. The Ministry claimed that the Green Dam requirement was designed to keep children away from violent and pornographic websites, but critics claimed that the requirement represented a broad form of Chinese government monitoring and censorship of internet use and content, including politically sensitive material. Only 20 days remained until the mandate took effect when the official regulation was announced, limiting time for public debate and causing logistical challenges for PC manufacturers.

RESOURCES FOR MORE IN-DEPTH INFORMATION ON THE CASE:

The Green Dam Cyber-Censor Case Primary Articles/Links

1. The Wikipedia page on the "Green Dam Youth Escort" has a reasonable overview.

2. What types of internet content are blocked in China?

3. Empirical Analysis of Internet Filtering in China

 

Have there been other attempts to censor internet content or monitor use in China?

1. Skype admits to storing China text messages

2. China Censors: The Tiananmen Square Anniversary Will Not Be Tweeted

3. Google censors itself for China 4. Yahoo 'Strictest' Censor in China

ASSIGNMENT QUESTIONS

Consider this scenario: Instead of the Green Dam Escort project, the Chinese government hires a huge international Namibian-based company to develop its compulsory internet browser program. The project is top-secret, and even the programmers aren't sure what it'll be used for. Meanwhile, you're working for Microsoft Inc. on a top-secret project in which code is divided into teams working on modules, and team members are kept in the dark regarding the whole application's functionality and purpose. You have a feeling it's a military effort, but you're not certain. Consider the possibilities below.

Question 1: Virtue Theory [50 marks]

You're concerned that the software module you're developing could be utilized by the government (or military) to track citizen internet usage. Such government invasion of privacy runs counter to your ideals and ethics, but it's just a hunch thus far. You tried to bring up this topic with your boss in an oblique way but were told that it was not your job nor your concern to consider the big picture—"just keep doing your work well as you have been, and don't worry about it." You want to retain your good connection with your boss because you've heard through others that if he doesn't like you, he can be a difficult guy to work for.

Then you hear on Public Radio about a news leak that describes China's Cyber-Sensor software mandate. The goals of regulating and monitoring citizen internet use are mentioned, but there are few details, and the news leak does not specify which software company is involved. You understand the project you're working on is maybe the one referenced. There are two reasons for you to be concerned about this software project right now. You start to wonder why a few of your coworkers were recently fired—was it because they started asking questions? You have a family to support and fantastic options for shares in the company that you would lose if you were fired.

Using the virtue theory:

a. What would you do?

b. What are your options?

c. What are the pros and cons of the various options at your disposal?

d. What informal criteria or principles do you use when weighing the pros and cons like this

Question 2: Utilitarian Theory [50 marks]

Organizations and governments have good reasons to monitor their employees' and citizens' behavior. They're worried about gaining a competitive advantage, sabotage, and spying; trade, diplomatic, or military secrets; national/corporate security breaches; and worker productivity. Nonetheless, in democratic countries, privacy and freedom of expression are fundamental virtues.

Using the utilitarian Theory:

a. What are your thoughts on how the interests can and should be balanced?

b. What procedures or safeguards should be put in place?

c. If possible, give an example context (real or hypothetical.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 2 images

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm…
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning