Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Law and Society

PDF

Articles, Book Chapters, & Popular Press

2020

Deepfakes

Articles 1 - 2 of 2

Full-Text Articles in Law

Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn Jan 2020

Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn

Articles, Book Chapters, & Popular Press

Advances in artificial intelligence (AI) and robotics technologies have destabilized our ability to control our identity. Today, it is increasingly accessible for the average person to appropriate the voice, image, and body of another individual through the use of technology. Deepfake videos swap new faces into existing videos, facial re-enactment allows for the face of one person to be superimposed on the face of someone else in a real time video, artificial speech synthesis can clone another person’s voice, and 3D printing and modern robotics can reproduce life-size copies of living people. These are all examples of the ways technology …


Technology-Facilitated Gender-Based Violence: An Overview, Suzie Dunn Jan 2020

Technology-Facilitated Gender-Based Violence: An Overview, Suzie Dunn

Articles, Book Chapters, & Popular Press

Technology facilitated gender-based violence (TFGBV) is a complex worldwide phenomenon with devastating results. Research to date shows that victim-survivors of intimate partner violence are tracked by their abusive partners who use technology to monitor their movements and communication. Many women journalists, human rights defenders and politicians face daily death threats and rape threats for speaking out about equality issues or for simply being a woman in a leadership role. Those with intersecting marginalized identities are at specific risk, with Black, Indigenous, and people of colour, LGBTQ+ people, and people with disabilities facing higher rates of attacks and concerted attacks that …