About artificial intelligence of deepfake

Assignment Help Basic Computer Science
Reference no: EM133092125

In the last Module, you learned about the artificial intelligence of deepfake. The technology of deepfake allows individuals to generate manipulated photos and videos using artificial intelligence software, such as FakeApp and DeepFaceLab, to generate the content (Elias, 2019). Although creating these fake images and videos may be fun and innovative for the person using the technology, the manipulated content has been known to cause deception, and sometimes harm, involving the individuals who are misrepresented in the videos.

Consider this scenario: A photo of you is on the internet, perhaps a photo you posted on social media or saved to the cloud that other people have access to. Then imagine that someone you barely know, or may not even know, uses that photo and AI to create an embarrassing video starring you. You never actually did what the video depicts, but the technology makes it look as if you have. Eventually, the deepfake video goes viral and is shared with the public.

Although this kind of situation may seem unrealistic, perhaps even scary to some people, it has happened to political world leaders and celebrities. Deepfake content has already caused negative implications for others (Elias, 2019). The social and societal implications of using such technology should be considered, especially as artificial intelligence becomes more prevalent.

Part 1

1. What were your initial reactions when you first heard about the artificial intelligence of deepfake?

2. Do you think deceptive technologies, like the artificial intelligence of deepfake, do more harm than good? Or do more good than harm?

3. Do the advantages of these kinds of technologies outweigh the negative societal and social implications?

Part 2

1. Determine whether you agree or disagree with your peers

2. Explain your rationale with a proper citation

3. Support your argument with at least one resource from any of the modules within this course.

Reference no: EM133092125

Questions Cloud

Integrated enterprise system : Discuss the four distinct layers of the conceptual framework of Extended Enterprise Systems (EES)?
Converting design specifications into data structures : Develop information systems by converting design specifications into data structures. List the steps necessary transform logical models to physical models.
Dissertation is theoretical basis : An important step in a dissertation is the theoretical basis that might help explain and shed light on why the problem is happening.
Exact change-methods : Define a method called exactChange that takes the total change amount in cents and an integer array as parameters.
About artificial intelligence of deepfake : What were your initial reactions when you first heard about the artificial intelligence of deepfake? Explain your rationale with a proper citation
Python program-json which has specific key value pair : Write a python program to extract all the blocks where value for ChecksWarning is more than 0.
Platform security architecture : How does the Platform Security Architecture (PSA) build trust while reducing security costs and time-to-market?
Encouraging security architecture developments : The Open Group has created an Enterprise Security Architect certification. The SANS Institute hosted three "What Works in Security Architecture" Summits.
Emerging threats and countermeasures : We reviewed number of areas in information security and threats that companies face, we face, numerous threats and ways we can help to minimize these attacks

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd