{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:28:38Z","timestamp":1766305718881,"version":"3.48.0"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"vor","delay-in-days":277,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1016\/j.procs.2025.10.098","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T22:13:48Z","timestamp":1762467228000},"page":"6278-6287","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Deepfakes, a blessing in\/or disguise \u2013 challenges of applying Generative AI tools"],"prefix":"10.1016","volume":"270","author":[{"given":"Grzegorz","family":"Chmielarz","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2025.10.098_bib1","unstructured":"https:\/\/aspolska.pl\/deepfake-rosnace-zagrozenie-w-swiecie-cyfrowym\/, accessed on 08.06.2025"},{"issue":"2","key":"10.1016\/j.procs.2025.10.098_bib2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1080\/00098655.2025.2488777","article-title":"Deepfake Cyberbullying: The Psychological Toll on Students and Institutional Challenges of AI-Driven Harassment","volume":"98","author":"Alexander","year":"2025","journal-title":"The Clearing House: A Journal of Educational Strategies, Issues and Ideas"},{"key":"10.1016\/j.procs.2025.10.098_bib3","unstructured":"Bitdefender, Cybersecurity Assessment Report 2024, https:\/\/www.bitdefender.com\/en-us\/business\/campaign\/cybersecurity-assessment\/cybersecurity-assessment-ty?submissionGuid=2a42b26d-dad5-4d71-a7a8-7cc635dfe269 accessed on 10.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib4","unstructured":"Bochy\u0144ska N., 2024, Wa\u017cne ostrze\u017cenie: ro\u015bnie liczba deepfake\u2019\u00f3w z wizerunkiem os\u00f3b publicznych, https:\/\/cyberdefence24.pl\/cyberbezpieczenstwo\/Wa\u017cne ostrze\u017cenie: ro\u015bnie liczba deepfake z wizerunkiem os\u00f3b publicznych, accessed on 09.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib5","doi-asserted-by":"crossref","unstructured":"Brzezi\u0144ski A. (2023), Specificity of Decentralized Autonomous Organizations as the Implementation of Blockchain Technology, Procedia Computer Science, Volume 225, Pages 4371-4380;","DOI":"10.1016\/j.procs.2023.10.434"},{"key":"10.1016\/j.procs.2025.10.098_bib6","doi-asserted-by":"crossref","unstructured":"Busacca, A., Monaca, M.A. (2023). Deepfake: Creation, Purpose, Risks. In: Marino, D., Monaca, M.A. (eds) Innovations and Economic and Social Changes due to Artificial Intelligence: The State of the Art. Studies in Systems, Decision and Control, vol 222. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-33461-0_6","DOI":"10.1007\/978-3-031-33461-0_6"},{"key":"10.1016\/j.procs.2025.10.098_bib7","doi-asserted-by":"crossref","unstructured":"Chmielarz. G., 2024, Data Management in Polish SMEs in the Era of AI\u2013Threats and Benefits of AI-Based Tools, Procedia Computer Science, Vol. 246, pp. 5439-5447, https:\/\/doi.org\/10.1016\/j.procs.2024.09.681","DOI":"10.1016\/j.procs.2024.09.681"},{"key":"10.1016\/j.procs.2025.10.098_bib8","unstructured":"Davenport, T. H., & Mittal, N. (2022). How generative AI is changing creative work. Harvard Business Review. https:\/\/hbr.org\/2022\/11\/how-generative-ai-is-changing-creative-work"},{"key":"10.1016\/j.procs.2025.10.098_bib9","unstructured":"Dauer F., 2022, Law Enforcement in the Era of Deepfakes, https:\/\/www.policechiefmagazine.org\/law-enforcement-era-deepfakes\/"},{"key":"10.1016\/j.procs.2025.10.098_bib10","doi-asserted-by":"crossref","unstructured":"Epstein Z., Hertzmann A., 2023, Art and the science of generative AI Science, vol. 80,11101111(2023). Doi: 10.1126\/science.adh4451","DOI":"10.1126\/science.adh4451"},{"key":"10.1016\/j.procs.2025.10.098_bib11","unstructured":"Gartner, What is Generative AI? Generative AI: What Is It, Tools, Models, Applications and Use Cases, accessed 10.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib12","unstructured":"Giardina C., 2025, Deepfake-Enabled Fraud Has Already Caused $200 Million in Financial Losses in 2025, New Report Finds, https:\/\/variety.com\/2025\/digital\/news\/deepfake-fraud-caused-200-million-losses-1236372068\/"},{"key":"10.1016\/j.procs.2025.10.098_bib13","doi-asserted-by":"crossref","unstructured":"Golf-Papez M., Heller J., Hilken T., Chylinski M., de Ruyter K., Keeling D. I., Mahr D., 2022, Embracing falsity through the metaverse: The case of synthetic customer experiences, Business Horizons, 65 (6), pp. 739-749, 10.1016\/j.bushor.2022.07.007","DOI":"10.1016\/j.bushor.2022.07.007"},{"key":"10.1016\/j.procs.2025.10.098_bib14","unstructured":"Hendrickson L. 2025, The Bright Side of Deepfakes: How AI Is Being Used for Good, https:\/\/www.identity.com\/the-bright-side-of-deepfakes, accessed 10.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib15","unstructured":"Makosz P., 2024, Czy polskie firmy s\u0105 nara\u017cone na ataki cyberprzest\u0119pc\u00f3w? Ten raport prezentuje gorzk\u0105 prawd\u0119, https:\/\/fashionbiznes.pl\/polskie-firmy-sa-narazone-na-ataki-cyberprzestepcow-raport\/, accessed on 10.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib16","doi-asserted-by":"crossref","unstructured":"Matli W., 2024, Extending the theory of information poverty to deepfake technology, International Journal of Information Management Data Insights, Volume 4, Issue 2, 100286, ISSN 2667-0968. https:\/\/doi.org\/10.1016\/j.jjimei.2024.100286","DOI":"10.1016\/j.jjimei.2024.100286"},{"key":"10.1016\/j.procs.2025.10.098_bib17","unstructured":"Murphey D., 2024, The deepfake dilemma: The importance of deepfake awareness training, https:\/\/www.securitymagazine.com\/articles\/101085-the-deepfake-dilemma-the-importance-of-deepfake-awareness-training, accessed 08.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib18","doi-asserted-by":"crossref","unstructured":"Murphy G., Ching D., Twomey J., Linehan C., 2023, Face\/off: Changing the face of movies with deepfakes, PLoS One, 18 (7), Article e0287503","DOI":"10.1371\/journal.pone.0287503"},{"key":"10.1016\/j.procs.2025.10.098_bib19","unstructured":"NASK, Cyberprofilaktyka, https:\/\/cyberprofilaktyka.pl\/blog\/deepfake-jak-sztuczna-inteligencja-moze-nas-oszukiwac_i40.html accesses on 10.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib20","doi-asserted-by":"crossref","unstructured":"Neyazi T. A., Nadaf A. H., Tan K. E., Schroeder R., 2024, Does trust in government moderate the perception towards deepfakes? Comparative perspectives from Asia on the risks of AI and misinformation for democracy, Government Information Quarterly, Volume 41, Issue 4, 2024, 101980, ISSN 0740-624X, https:\/\/doi.org\/10.1016\/j.giq.2024.101980","DOI":"10.1016\/j.giq.2024.101980"},{"key":"10.1016\/j.procs.2025.10.098_bib21","doi-asserted-by":"crossref","unstructured":"Patil K., Pramod D., Bharathi V. S., AlSaleh D., 2025, Exploring the affective and cognitive dimensions of customer stickiness in deepfake platforms through the theoretical lens of attachment, International Journal of Information Management Data Insights, Volume 5, Issue 1, 100344, ISSN 2667-0968, https:\/\/doi.org\/10.1016\/j.jjimei.2025.100344","DOI":"10.1016\/j.jjimei.2025.100344"},{"key":"10.1016\/j.procs.2025.10.098_bib22","doi-asserted-by":"crossref","unstructured":"Rabhi M., Bakiras S., Di Pietro R., 2024, Audio-deepfake detection: Adversarial attacks and countermeasures, Expert Systems with Application, Volume 250, 123941, ISSN 0957-4174, https:\/\/doi.org\/10.1016\/j.eswa.2024.123941","DOI":"10.1016\/j.eswa.2024.123941"},{"key":"10.1016\/j.procs.2025.10.098_bib23","doi-asserted-by":"crossref","unstructured":"Saifuddin Ahmed, Hui Wen Chua, 2023, Perception and deception: Exploring individual responses to deepfakes across different modalities, Heliyon, Volume 9, Issue 10, e20383, ISSN 2405-8440. https:\/\/doi.org\/10.1016\/j.heliyon.2023.e20383","DOI":"10.1016\/j.heliyon.2023.e20383"},{"key":"10.1016\/j.procs.2025.10.098_bib24","doi-asserted-by":"crossref","unstructured":"Shi L., Zhang J., Ji Z., Bai I., Shan S, 2025, Real face foundation representation learning for generalized deepfake detection, Pattern Recognition, Volume 161, 111299, ISSN 0031-3203. https:\/\/doi.org\/10.1016\/j.patcog.2024.111299","DOI":"10.1016\/j.patcog.2024.111299"},{"key":"10.1016\/j.procs.2025.10.098_bib25","unstructured":"Smith S., 2024, The Year Of The Deepfake: Combating Digital Deception In 2024 And Beyond, https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2024\/12\/30\/the-year-of-the-deepfake-combating-digital-deception-in-2024-and-beyond\/, accessed 10.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib26","doi-asserted-by":"crossref","unstructured":"Vecchietti G., Liyanaarachchi G., Viglia G., 2025, Managing deepfakes with artificial intelligence: Introducing the business privacy calculus, Journal of Business Research, Volume 186, 115010, ISSN 0148-2963, https:\/\/doi.org\/10.1016\/j.jbusres.2024.115010","DOI":"10.1016\/j.jbusres.2024.115010"},{"key":"10.1016\/j.procs.2025.10.098_bib27","doi-asserted-by":"crossref","unstructured":"Vivekananda G.N., Mahesh T.R., Gupta M., Thakur A., Sayal A, 2025, Refining digital security with EfficientNetV2-B2 deepfake detection techniques, Egyptian Informatics Journal, Volume 30, 100699, ISSN 1110-8665, https:\/\/doi.org\/10.1016\/j.eij.2025.100699","DOI":"10.1016\/j.eij.2025.100699"},{"key":"10.1016\/j.procs.2025.10.098_bib28","doi-asserted-by":"crossref","unstructured":"Whittaker L., Letheren K., Mulcahy R., 2021, The rise of Deepfakes: A conceptual framework and research agenda for marketing, Australasian Marketing Journal, 29 (3), pp. 204-214, 10.1177\/1839334921999479","DOI":"10.1177\/1839334921999479"},{"key":"10.1016\/j.procs.2025.10.098_bib29","unstructured":"Zegarow P., 2025, Deepfaki-prawdziwy problem z fa\u0142szyw\u0105 rzeczywisto\u015bci\u0105, https:\/\/nask.pl\/magazyn\/deepfaki-prawdziwy-problem-z-falszywa-rzeczywistoscia, accessed 09.06.2025"},{"key":"10.1016\/j.procs.2025.10.098_bib30","unstructured":"(PDF) Mitigating Human Rights Violations Caused by Deepfake Technology. Available from: https:\/\/www.researchgate.net\/publication\/384765955_Mitigating_Human_Rights_Violations_Caused_by_Deepfake_Technology, accessed on 13.06.202."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925034313?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925034313?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:24:32Z","timestamp":1766305472000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050925034313"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"alternative-id":["S1877050925034313"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2025.10.098","relation":{},"ISSN":["1877-0509"],"issn-type":[{"type":"print","value":"1877-0509"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Deepfakes, a blessing in\/or disguise \u2013 challenges of applying Generative AI tools","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2025.10.098","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Politechnika Cz\u0119stochowska. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}