<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2448-5136</journal-id>
<journal-title><![CDATA[Derecho global. Estudios sobre derecho y justicia]]></journal-title>
<abbrev-journal-title><![CDATA[Derecho glob. Estud. sobre derecho justicia]]></abbrev-journal-title>
<issn>2448-5136</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Guadalajara, División de Estudios Jurídicos]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2448-51362024000200359</article-id>
<article-id pub-id-type="doi">10.32870/dgedj.v9i27.754</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Deepfake: Análisis de sus implicancias tecnológicas y jurídicas en la era de la Inteligencia Artificial]]></article-title>
<article-title xml:lang="en"><![CDATA[Deepfake Technology: A Comprehensive Examination of Its Technological and Legal Implications in the Era of Artificial Intelligence]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ramos-Zaga]]></surname>
<given-names><![CDATA[Fernando]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Privada del Norte  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Peru</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<volume>9</volume>
<numero>27</numero>
<fpage>359</fpage>
<lpage>387</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2448-51362024000200359&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2448-51362024000200359&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2448-51362024000200359&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El surgimiento de la tecnología deepfake ha provocado un cambio trascendental en el mundo digital, exigiendo acciones proactivas tanto desde al ámbito académico como de los responsables políticos, debido a los múltiples desafíos que presenta a diferentes industrias. En ese sentido, el objetivo del presente artículo es analizar las implicancias tecnológicos y jurídicos en torno al deepfake, subrayando la necesidad imperiosa de que los marcos jurídicos se adapten a los retos que plantea el uso de la inteligencia artificial (IA). Para tal propósito, se llevó a cabo una revisión de la literatura especializada, concentrándose específicamente en los aspectos tecnológicos y los desafíos regulatorios que plantea la tecnología deepfake. Los hallazgos muestran la urgente necesidad de marcos jurídicos efectivos y acordes a los retos que plantea el vertiginoso avance tecnológico para hacer frente a los retos planteados a través del deepfake mediante la colaboración internacional para abordar estas cuestiones de manera integral. Se concluye que es de vital importancia contar con regulación que siga el ritmo de los avances tecnológicos para mitigar las posibles adversidades asociadas al uso de la tecnología deepfake.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The emergence of deepfake technology has triggered a significant transformation in the digital landscape, necessitating proactive responses from academia and policymakers to address the diverse challenges it introduces across various sectors. This article aims to delve into the technological and legal dimensions of deepfake, stressing the critical importance of adapting legal frameworks to the evolving landscape of artificial intelligence (AI) applications. Through an extensive examination of scholarly sources, the analysis focuses on the technological intricacies and regulatory hurdles presented by deepfake technology. The research underscores the urgent requirement for robust legal structures that can effectively respond to the rapid advancements in technology, advocating for a collaborative approach on a global scale to tackle deepfake issues comprehensively. The study concludes that maintaining up-to-date regulations that parallel technological progress is essential in mitigating the potential negative impacts associated with the proliferation of deepfake technology.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Ultrafalso]]></kwd>
<kwd lng="es"><![CDATA[inteligencia artificial]]></kwd>
<kwd lng="es"><![CDATA[legislación]]></kwd>
<kwd lng="es"><![CDATA[tecnología]]></kwd>
<kwd lng="es"><![CDATA[privacidad]]></kwd>
<kwd lng="es"><![CDATA[seguridad]]></kwd>
<kwd lng="es"><![CDATA[delitos]]></kwd>
<kwd lng="es"><![CDATA[colaboración internacional.]]></kwd>
<kwd lng="en"><![CDATA[Deepfake]]></kwd>
<kwd lng="en"><![CDATA[artificial intelligence]]></kwd>
<kwd lng="en"><![CDATA[legislation]]></kwd>
<kwd lng="en"><![CDATA[technology]]></kwd>
<kwd lng="en"><![CDATA[privacy]]></kwd>
<kwd lng="en"><![CDATA[security]]></kwd>
<kwd lng="en"><![CDATA[crimes]]></kwd>
<kwd lng="en"><![CDATA[international collaboration.]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ayers]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The limits of transactional identity: Whiteness and embodiment in digital facial replacement]]></article-title>
<source><![CDATA[Convergence]]></source>
<year>2021</year>
<volume>27</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1018-37</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bayer]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Holznagel]]></surname>
<given-names><![CDATA[D. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Katarzyna]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pace]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Szakács]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Uszkiewicz]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Disinformation and propaganda: Impact on the functioning of the rule of law and democratic processes in the EU and its Member States: 2021 update]]></source>
<year>2021</year>
<publisher-name><![CDATA[European Parliament Policy Department for External Relations]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<collab>BBC News</collab>
<article-title xml:lang=""><![CDATA[AI-generated naked child images shock Spanish town of Almendralejo.]]></article-title>
<source><![CDATA[BBC News]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Berenzen]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deepfakes as a Threat to Democracy: Perceptions, Challenges, and Implications of Deepfake Discourses in Democracies]]></source>
<year>2023</year>
<publisher-name><![CDATA[University of Twente]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bode]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lees]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Golding]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Digital Face and Deepfakes on Screen]]></article-title>
<source><![CDATA[Convergence]]></source>
<year>2021</year>
<volume>27</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>849-54</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Busacca]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Monaca]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfake: Creation, Purpose, Risks]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Marino]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Monaca]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Innovations and Economic and Social Changes due to Artificial Intelligence: The State of the Art]]></source>
<year>2023</year>
<page-range>55-68</page-range><publisher-name><![CDATA[Springer Nature Switzerland]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Casals]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las propuestas de la Unión Europea para regular la responsabilidad civil por los daños causados por sistemas de inteligencia artificial]]></article-title>
<source><![CDATA[InDret]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Diakopoulos]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Anticipating and addressing the ethical implications of deepfakes in the context of elections]]></article-title>
<source><![CDATA[New Media &amp; Society]]></source>
<year>2021</year>
<volume>23</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>2072-98</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duminica]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ilie]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ethical and Legal Aspects of the Development and Use of Robotics and Artificial Intelligence]]></article-title>
<source><![CDATA[JL &amp; Admin. Sci.]]></source>
<year>2023</year>
<volume>19</volume>
<page-range>20</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<collab>El País México</collab>
<article-title xml:lang=""><![CDATA[Acusado un universitario de alterar con inteligencia artificial miles de imágenes de alumnas para venderlas como pornografía]]></article-title>
<source><![CDATA[El País México]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Etienne]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The future of online trust (and why Deepfake is advancing it)]]></article-title>
<source><![CDATA[AI and Ethics]]></source>
<year>2021</year>
<volume>1</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>553-62</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farid]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Creating, Using, Misusing, and Detecting Deep Fakes]]></article-title>
<source><![CDATA[Journal of Online Trust and Safety]]></source>
<year>2022</year>
<volume>1</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gambín]]></surname>
<given-names><![CDATA[Á. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Yazidi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vasilakos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Haugerud]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Djenouri]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfakes: Current and future trends]]></article-title>
<source><![CDATA[Artificial Intelligence Review]]></source>
<year>2024</year>
<volume>57</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Glikson]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Woolley]]></surname>
<given-names><![CDATA[A. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Human Trust in Artificial Intelligence: Review of Empirical Research]]></article-title>
<source><![CDATA[Academy of Management Annals]]></source>
<year>2020</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>627-60</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Greenough]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Make it, Fake it and Get Away with it? The Role of Toxic Masculinity and Threat Perception within Cases, Policies, and Legislation Surrounding Deepfakes]]></source>
<year>2022</year>
<publisher-name><![CDATA[University of Auckland]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hameleers]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[van der Meer]]></surname>
<given-names><![CDATA[T. G. L. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Dobber]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distorting the truth versus blatant lies: The effects of different degrees of deception in domestic and foreign political deepfakes]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2024</year>
<volume>152</volume>
<page-range>108096</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heidari]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jafari Navimipour]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Dag]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Unal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfake detection using deep learning methods: A systematic and comprehensive review]]></article-title>
<source><![CDATA[WIREs Data Mining and Knowledge Discovery]]></source>
<year>2023</year>
<volume>n/a</volume>
<numero>n/a</numero>
<issue>n/a</issue>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jagatheesaperumal]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahouti]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Fuqaha]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Guizani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Duo of Artificial Intelligence and Big Data for Industry 4.0: Applications, Techniques, Challenges, and Future Research Directions]]></article-title>
<source><![CDATA[IEEE Internet of Things Journal]]></source>
<year>2022</year>
<volume>9</volume>
<numero>15</numero>
<issue>15</issue>
<page-range>12861-85</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jinana]]></surname>
<given-names><![CDATA[H. H. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The English torts of defamation and (false) privacy: Analysing the impact of the overlap on defences, interim injunctions and damages]]></source>
<year>2020</year>
<publisher-name><![CDATA[Keele University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karnouskos]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial Intelligence in Digital Media: The Era of Deepfakes]]></article-title>
<source><![CDATA[IEEE Transactions on Technology and Society]]></source>
<year>2020</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>138-47</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khuat]]></surname>
<given-names><![CDATA[T. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kedziora]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gabrys]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Roles and Modes of Human Interactions with Automated Machine Learning Systems]]></article-title>
<source><![CDATA[arXiv]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kirchengast]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfakes and image manipulation: Criminalisation and control]]></article-title>
<source><![CDATA[Information &amp; Communications Technology Law]]></source>
<year>2020</year>
<volume>29</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>308-23</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kugler]]></surname>
<given-names><![CDATA[M. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Pace]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfake privacy: Attitudes and regulation]]></article-title>
<source><![CDATA[Nw. UL Rev.]]></source>
<year>2021</year>
<volume>116</volume>
<page-range>611</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Langa]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfakes, real consequences: Crafting legislation to combat threats posed by deepfakes]]></article-title>
<source><![CDATA[BUL Rev.]]></source>
<year>2021</year>
<volume>101</volume>
<page-range>761</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leiser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bias, journalistic endeavours, and the risks of artificial intelligence]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Pihlajarinne]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Alén-Savikko]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Artificial Intelligence and the Media]]></source>
<year>2022</year>
<page-range>8-32</page-range><publisher-name><![CDATA[Edward Elgar Publishing Ltd.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wan]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Norms or fun? The influence of ethical concerns and perceived enjoyment on the regulation of deepfake information]]></article-title>
<source><![CDATA[Internet Research]]></source>
<year>2023</year>
<volume>33</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1750-73</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ebrahimi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Assessment framework for deepfake detection in real-world situations]]></article-title>
<source><![CDATA[EURASIP Journal on Image and Video Processing]]></source>
<year>2024</year>
<volume>2024</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lussier]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Nonconsensual Deepfakes: Detecting and regulating this rising threat to privacy]]></article-title>
<source><![CDATA[Idaho L. Rev.]]></source>
<year>2022</year>
<volume>58</volume>
<page-range>353</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mahashreshty]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Implications of Deepfake Technology on Individual Privacy and Security]]></source>
<year>2023</year>
<publisher-name><![CDATA[St. Cloud State University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mammadzada]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deepfake and Freedom of Expression: European Perspective]]></source>
<year>2021</year>
<publisher-name><![CDATA[Tallinn University of Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mekkawi]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The challenges of Digital Evidence usage in Deepfake Crimes Era]]></article-title>
<source><![CDATA[Journal of Law and Emerging Technologies]]></source>
<year>2023</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montasari]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Responding to Deepfake Challenges in the United Kingdom: Legal and Technical Insights with Recommendations]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Montasari]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses]]></source>
<year>2024</year>
<page-range>241-58</page-range><publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mukta]]></surname>
<given-names><![CDATA[M. S. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Raiaan]]></surname>
<given-names><![CDATA[M. A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Islam]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Azam]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Jonkman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Investigation of the Effectiveness of Deepfake Models and Tools]]></article-title>
<source><![CDATA[Journal of Sensor and Actuator Networks]]></source>
<year>2023</year>
<volume>12</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mustak]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Salminen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mäntymäki]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Dwivedi]]></surname>
<given-names><![CDATA[Y. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfake: Deceptions, mitigations, and opportunities]]></article-title>
<source><![CDATA[Journal of Business Research]]></source>
<year>2023</year>
<volume>154</volume>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naitali]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ridouani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Salahdine]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Kaabouch]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions]]></article-title>
<source><![CDATA[Computers]]></source>
<year>2023</year>
<volume>12</volume>
<numero>10</numero>
<issue>10</issue>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ng]]></surname>
<given-names><![CDATA[G. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[W. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Strong Artificial Intelligence and Consciousness]]></article-title>
<source><![CDATA[Journal of Artificial Intelligence and Consciousness]]></source>
<year>2020</year>
<volume>07</volume>
<numero>01</numero>
<issue>01</issue>
<page-range>63-72</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nikolakopoulos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Segui]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pellicer]]></surname>
<given-names><![CDATA[A. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kefalogiannis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gizelis]]></surname>
<given-names><![CDATA[C.-A.]]></given-names>
</name>
<name>
<surname><![CDATA[Marinakis]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Nestorakis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Varvarigou]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[BigDaM: Efficient Big Data Management and Interoperability Middleware for Seaports as Critical Infrastructures]]></article-title>
<source><![CDATA[Computers]]></source>
<year>2023</year>
<volume>12</volume>
<numero>11</numero>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="">
<collab>OCDE</collab>
<source><![CDATA[Principios de la OCDE sobre Inteligencia Artificial]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[O&#8217;Halloran]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Technical, Legal, and Ethical Landscape of Deepfake Pornography]]></source>
<year>2021</year>
<publisher-name><![CDATA[Brown University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Okolie]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial Intelligence-Altered Videos (Deepfakes), Image-Based Sexual Abuse, and Data Privacy Concerns]]></article-title>
<source><![CDATA[Journal of International Women&#8217;s Studies]]></source>
<year>2023</year>
<volume>25</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pantserev]]></surname>
<given-names><![CDATA[K. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Malicious Use of AI-Based Deepfakes Technology as the New Threat to Psychological Security and Political Stability]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Jahankhani]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kendzierskyj]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chelvachandran]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ibarra]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity]]></source>
<year>2020</year>
<page-range>37-55</page-range><publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pascale]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deeply Dehumanizing, Degrading, and Violating: Deepfake Pornography and the Path to Legal Recourse]]></article-title>
<source><![CDATA[Syracuse L. Rev.]]></source>
<year>2023</year>
<volume>73</volume>
<page-range>335</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pavis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Rebalancing our regulatory response to Deepfakes with performers&#8217; rights]]></article-title>
<source><![CDATA[Convergence]]></source>
<year>2021</year>
<volume>27</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>974-98</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pawelec]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfakes and Democracy (Theory): How Synthetic Audio-Visual Media for Disinformation and Hate Speech Threaten Core Democratic Functions]]></article-title>
<source><![CDATA[Digital Society]]></source>
<year>2022</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>19</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<collab>Peru21</collab>
<article-title xml:lang=""><![CDATA[El lado oscuro de la Inteligencia Artificial: La manipulación de voz e imágenes]]></article-title>
<source><![CDATA[Peru21]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pombo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Cabrol]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alarcón]]></surname>
<given-names><![CDATA[N. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ávalos]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[fAIr LAC: Adopción ética y responsable de la inteligencia artificial en América Latina y el Caribe]]></article-title>
<source><![CDATA[IDB Publications]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Popova]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reading out of context: Pornographic deepfakes, celebrity and intimacy]]></article-title>
<source><![CDATA[Porn Studies]]></source>
<year>2020</year>
<volume>7</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>367-81</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rizzica]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sexually explicit deepfakes: To what extent do legal responses protect the depicted persons?]]></source>
<year>2021</year>
<publisher-name><![CDATA[Tilburg University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schick]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deepfakes: The coming infocalypse]]></source>
<year>2020</year>
<publisher-name><![CDATA[Hachette UK]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[D. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Dhiman]]></surname>
<given-names><![CDATA[D. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploding AI-Generated Deepfakes and misinformation: A threat to global concern in the 21st century]]></article-title>
<source><![CDATA[TechRxiv]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Staab]]></surname>
<given-names><![CDATA[L. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Making Sense of Deepfakes: Epistemic Harms and the EU Policy Response]]></source>
<year>2023</year>
<publisher-name><![CDATA[Universiteit Twente]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tahraoui]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Krätzer]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dittmann]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Defending Informational Sovereignty by Detecting Deepfakes: Risks and Opportunities of an AI-Based Detector for Deepfake-Based Disinformation and Illegal Activities]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Herlo]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Irrgang]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Proceedings of the Weizenbaum Conference 2022: Practicing Sovereignty&#8212;Interventions for Open Digital Futures]]></source>
<year>2023</year>
<page-range>142-61</page-range><publisher-name><![CDATA[Weizenbaum Institute for the Networked Society The German Internet Institute]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tariq]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Iftikhar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaudhary]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Khurshid]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Is the &#8216;Technological Singularity Scenario&#8217; possible: Can AI parallel and surpass all human mental capabilities?]]></article-title>
<source><![CDATA[World Futures]]></source>
<year>2023</year>
<volume>79</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>200-66</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="">
<collab>UNESCO</collab>
<source><![CDATA[Recomendación sobre la ética de la inteligencia artificial]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="">
<collab>US Congress</collab>
<source><![CDATA[S.2559 117th Congress (2021-2022): Deepfake Task Force Act]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vasist]]></surname>
<given-names><![CDATA[P. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Krishnan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deepfake: An integrative review of the literature and an agenda for future research]]></article-title>
<source><![CDATA[Communications of the Association for Information Systems]]></source>
<year>2022</year>
<volume>51</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
