About the artificial intelligence of deepfake

Assignment Help Basic Computer Science
Reference no: EM133194850 , Length: 2 Pages

In Module Seven, you learned about the artificial intelligence of deepfake. The technology of deepfake allows individuals to generate manipulated photos and videos using artificial intelligence software, such as FakeApp and DeepFaceLab, to generate the content (Elias, 2019). Although creating these fake images and videos may be fun and innovative for the person using the technology, the manipulated content has been known to cause deception, and sometimes harm, involving the individuals who are misrepresented in the videos.

Consider this scenario: A photo of you is on the internet, perhaps a photo you posted on social media or saved to the cloud that other people have access to. Then imagine that someone you barely know, or may not even know, uses that photo and AI to create an embarrassing video starring you. You never actually did what the video depicts, but the technology makes it look as if you have. Eventually, the deepfake video goes viral and is shared with the public.

Although this kind of situation may seem unrealistic, perhaps even scary to some people, it has happened to political world leaders and celebrities. Deepfake content has already caused negative implications for others (Elias, 2019). The social and societal implications of using such technology should be considered, especially as artificial intelligence becomes more prevalent.

1. What were your initial reactions when you first heard about the artificial intelligence of deepfake?

2. Do you think deceptive technologies, like the artificial intelligence of deepfake, do more harm than good? Or do more good than harm?

3. Do the advantages of these kinds of technologies outweigh the negative societal and social implications?

Reference no: EM133194850

Questions Cloud

Perform one round DES encryption : Aveda Institute New York-Given a 64-bit plaintext FFFE 397D AC28 8855 and 48-bit Round key 4D77 32C5 29EF, perform one round DES encryption
Discuss COVID-19 within the context of a chronic disease : BHM480 Social and Economic Impact of Chronic Disease Assignment - Seneca College - Discuss COVID-19 within the context of a chronic disease
How does the difference in the overarching goals : How does the difference in the overarching goals of the juvenile court versus the criminal court influence the decision-making process to grant probation?
Avoidance and approach or the flight-or-fight response : Broward Community College Find two peer-reviewed journal articles on motivation in regards to avoidance and approach or the Flight-or-Fight response.
About the artificial intelligence of deepfake : Southern New Hampshire University-In Module Seven, you learned about the artificial intelligence of deepfake.
What does bargaining in good faith entail : Saint Leo University - What are the restrictions upon management regarding interrogation and communications with employees during the organizing campaign?
Find written by flannery o connor : Compose an analytical essay of at least 1,200 words in which you offer an interpretation of a literary element in one of the assigned short stories.
Describe an environmental problem caused because of industry : Rutgers university - Identify and describe an environmental problem that is caused because an industry does not follow full-cost pricing.
Interview a senior citizen portfolio assignment : PSY 375 University of Phoenix Read the Interview a Senior Citizen Portfolio Assignment document and complete the assignment as directed.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Develop new information security policy

If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy?

  Advantages and disadvantages of 16-psk versus 16-qam modems

In order to have approximately the same performance (error rates) at the receiver, what should be the difference (in decibels) in the transmitted power for the two transmitters? What are the advantages and disadvantages of 16-PSK versus 16-QAM mod..

  Explain how each fiscal policy influences gdp

Explain how each fiscal policy influences GDP.

  Internet access for security purposes

Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their e-mail or Internet access for security purposes.

  String of its spoken equivalent

Using python 3, design a function digit_to_string(n): that converts a five digit number n to a string of its spoken equivalent.

  Median prices for the area to prospective buyers

Suppose you were selling your house. Would you quote mean or median prices for the area to prospective buyers?

  Describe social bandwidth

Describe social bandwidth and share an experience you've had with this concept within your previous interactions.

  Packet tracer simulation

There will be lab activities from "Packet Tracer simulation. You will conduct each activity step by step and answer questions at the end.

  Understand atleast some programming languages

Great computer experts have to understand atleast some programming languages

  Describe an implementation that halves the size of array

Describe an implementation that halves the size of the array in this case. What are the advantages and disadvantages of such an implementation?

  What normal form this table is in

REPAIR (RepairInvoiceNumber, RepairDate, RepairCost, RepairEmployeeName, RepairEmployeePhone, SerialNumber, Type, TankCapacity)

  Reflection and critical evaluation

The content of this class as they relate to Team Management and managerial decision making.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd