Skip to search formSkip to main contentSkip to account menu
DOI:10.2139/SSRN.3213954 - Corpus ID: 158865631
@article{Chesney2018DeepFA, title={Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security}, author={Robert M. Chesney and Danielle Keats Citron}, journal={California Law Review}, year={2018}, volume={107}, pages={1753}, url={https://api.semanticscholar.org/CorpusID:158865631}}
- Robert M. Chesney, D. Citron
- Published 14 July 2018
- Political Science, Computer Science, Law
- California Law Review
The aim is to provide the first in-depth assessment of the causes and consequences of this disruptive technological change, and to explore the existing and potential tools for responding to it.
View PDF
423 Citations
20
221
15
2
423 Citations
- S. AgarwalH. FaridYuming GuMingming HeKoki NaganoHao Li
- 2019
Political Science, Computer Science
CVPR Workshops
A forensic technique is described that models facial expressions and movements that typify an individual’s speaking pattern that can be used for authentication in the creation of deepfake videos.
- 404
- PDF
- Talat ZubairAmana RaquibJunaid Qadir
- 2019
Computer Science, Political Science
ICR Journal
This paper discusses the technologies that have led to the rise of problems such as fake news articles, filter bubbles, social media bots, and deep-fake videos, and their implications, while providing insights from the Islamic ethical tradition that can aid in mitigating them.
- 9
- PDF
Political Science, Law
The future outlook for deepfakes is illustrated and analyzed using future foresight methods, including; the futures wheel, a swot analysis and scenario planning, and the complex ethical, legal, and social issues surrounding the use of deepfake on the policing sector are examined through an interdisciplinary method.
- A. de Ruiter
- 2021
Computer Science, Law
The main argument is that deepfake technology and deepfakes are morally suspect, but not inherently morally wrong, and if so, why.
- 49
- PDF
- Suyoung Baek
- 2020
Law, Political Science
The threat of deepfakes is well-documented in the existing literature. Deepfake technology has emerged as a powerful tool with which vulnerable individuals could easily become targets of novel forms…
- 2
- Paola MavrikiMaria Karyda
- 2019
Political Science, Computer Science
e-Democracy
This paper identifies long-term privacy implications which may undermine fundamental features of democracy such as fair elections and political equality of all citizens and argues that big data analytics raises the need to develop alternative narratives to the concept of privacy.
- 2
- Nour and GelfandNika NourJ. Gelfand
- 2022
Computer Science
A portmanteau combines deep learning aspects of AI with the doctored or falsified enhancements that deem the content fake and now deepfake or misinformation results.
- 6
- PDF
- A. QayyumJunaid QadirM. JanjuaFalak Sher
- 2019
Computer Science, Political Science
IT Professional
A high-level overview of a blockchain-based framework for fake news prevention is proposed and the various design issues and consideration of such a Blockchain- based framework for tackling fake news are highlighted.
- 67
- Highly Influenced[PDF]
- Jianguo JiangBoquan Li Min Yu
- 2021
Computer Science
2021 IEEE 23rd Int Conf on High Performance…
To defend against adversarial Deepfakes, this work proposes a residual fingerprint-based defense customized for Deepfake detectors, and constructs a reconstruction network, and proposes novel strategies to degrade the adversarial efficacy as well as extract discriminative residual fingerprints.
- 1
- Dr. Bharat Dhiman
- 2023
Computer Science, Political Science
Qeios
This review paper examines the multifaceted landscape of deepfakes, encompassing their technological underpinnings, societal implications, detection methodologies, and ethical considerations, and culminates in an overview of future directions and recommendations, advocating for proactive measures to counter the escalating threat posed by AI-generatedDeepfake.
...
...
52 References
- Paul Ohm
- 2008
Computer Science, Law
An innovative new theory of communications privacy is proposed to help policymakers strike the proper balance between user privacy and ISP need and injects privacy into the network neutrality debate - a debate about who gets to control innovation on the Internet.
- 47
- PDF
- Scott R. Peppet
- 2010
Computer Science, Law
It is argued that informational privacy law must focus on the economics of signaling and its unraveling of privacy, which creates new types of privacy harms.
- 88
- Paul Ohm
- 2009
Computer Science
It is necessary to respond to the surprising failure of anonymization, and this Article provides the tools to do so.
- 1,011
- PDF
- D. CitronHelen L. Norton
- 2011
Sociology, Computer Science
This work believes that a thoughtful and nuanced intermediary-based approach to hate speech can foster respectful online discourse without suppressing valuable expression and urges intermediaries to help address cyber hate by adopting accessible and transparent policies that educate users about their rights and responsibilities as digital citizens.
- 146
- PDF
- Tim Hwang
- 2017
Political Science, Law
Recent revelations surrounding Russian interference in the 2016 US presidential election and the role that "fake news" may have played in shaping voter preferences have sparked a broad conversation…
- 5
- PDF
- Woodrow HartzogDaniel J. Solove
- 2015
Law, Computer Science
It is argued that the FTC not only has the authority to regulate data protection to the extent it has been doing, but that its granted jurisdiction can expand its reach much more and should be fully embraced to respond to the privacy harms unaddressed.
- 32
- PDF
- Daniel J. SoloveWoodrow Hartzog
- 2013
Law
One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late 1990s, the Federal…
- 164
- PDF
- Neil M. Richards
- 2017
Law, Computer Science
The debate over the Third-Party Doctrine is put in historical, jurisprudential, and technological context, and a normative and civil-liberties-protective way forward for Fourth Amendment law in the age of the cloud is offered.
- 2
- Soroush VosoughiD. RoySinan Aral
- 2018
Political Science, Computer Science
Science
A large-scale analysis of tweets reveals that false rumors spread further and faster than the truth, and false news was more novel than true news, which suggests that people were more likely to share novel information.
- 4,857
- PDF
- D. Citron
- 2016
Law, Political Science
Accounts of privacy law have focused on legislation, federal agencies, and the self-regulation of privacy professionals. Crucial agents of regulatory change, however, have been ignored: the state…
- 23
- PDF
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers