{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:06:26Z","timestamp":1728965186977},"reference-count":45,"publisher":"Oxford University Press (OUP)","issue":"6","license":[{"start":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T00:00:00Z","timestamp":1721520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/pages\/standard-publication-reuse-rights"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,14]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Voice Intelligent Assistants provide users with new ways of human-computer interaction. With built-in screens, Voice Intelligent Assistants can display images and videos upon users\u2019 requests. Even though images and videos present information in a lively manner, they might also contain overwhelming harmful contents. Due to the lack of effective evaluation mechanisms, it is difficult to prevent the propagation of harmful contents while ensuring the dissemination of compliant visual contents. This research defined a standardized set of classification criteria to identify and classify harmful visual contents. Then, Intelligent Image and Video Rating System, a prototype rating system that implemented the classification criteria was designed and developed. This research further evaluated and verified the reliability and efficiency of the prototype. The prototype system demonstrated additional advantages in swiftly classifying new hazardous contents, and in differentiating the multiple meanings of the same object in different contexts.<\/jats:p>","DOI":"10.1093\/iwc\/iwae034","type":"journal-article","created":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T08:25:46Z","timestamp":1721636746000},"page":"406-415","source":"Crossref","is-referenced-by-count":0,"title":["IIVRS: an Intelligent Image and Video Rating System to Provide Scenario-Based Content for Different Users"],"prefix":"10.1093","volume":"36","author":[{"given":"Rui","family":"Kang","sequence":"first","affiliation":[{"name":"Department of Industrial Engineering, Tsinghua University , Beijing 100084 ,","place":["China"]}]},{"given":"Pei-Luen Patrick","family":"Rau","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, Tsinghua University , Beijing 100084 ,","place":["China"]}]}],"member":"286","published-online":{"date-parts":[[2024,7,21]]},"reference":[{"key":"2024101411141050700_ref1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5038\/2771-5957.2.1.1016","article-title":"Let the devil speak for itself: should ChatGPT be allowed or banned in hospitality and tourism schools?","volume":"2","author":"Ali","year":"2023","journal-title":"Journal of Global Hospitality and Tourism"},{"key":"2024101411141050700_ref2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3311956","article-title":"Music, search, and IoT: how people (really) use voice assistants","volume":"26","author":"Ammari","year":"2019","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"year":"2017","author":"Korea Media Rating Board","key":"2024101411141050700_ref3"},{"key":"2024101411141050700_ref4","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/ProComm.2019.00025","volume-title":"2019 IEEE International Professional Communication Conference (ProComm)","author":"Burbach","year":"2019"},{"key":"2024101411141050700_ref5","first-page":"101","volume-title":"2020 IEEE\/ITU International Conference on Artificial Intelligence for Good (AI4G)","author":"Chen","year":"2020"},{"key":"2024101411141050700_ref6","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1142\/S0218001411009056","article-title":"Violent scene detection in movies","volume":"25","author":"Chen","year":"2011","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"2024101411141050700_ref7","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1145\/3607199.3607237","volume-title":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","author":"Chen","year":"2023"},{"key":"2024101411141050700_ref8","doi-asserted-by":"publisher","first-page":"e9705","DOI":"10.2196\/mhealth.9705","article-title":"Health and fitness apps for hands-free voice-activated assistants: content analysis","volume":"6","author":"Chung","year":"2018","journal-title":"JMIR mHealth and uHealth"},{"year":"2017","author":"Classification and Rating Administration","key":"2024101411141050700_ref9"},{"year":"2017","author":"Computer Entertainment Rating Organization","key":"2024101411141050700_ref10"},{"key":"2024101411141050700_ref11","first-page":"1","article-title":"Are ChatGPT and deepfake algorithms endangering the cybersecurity industry? A review","volume":"10","author":"Dash","year":"2023","journal-title":"International Journal of Engineering and Applied Sciences"},{"key":"2024101411141050700_ref12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TDSC.2021.3129116","article-title":"SkillVet: automated traceability analysis of Amazon Alexa skills","volume":"20","author":"Edu","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"year":"2017","author":"Entertainment Software Rating Board","key":"2024101411141050700_ref13"},{"article-title":"Classification guidelines","year":"2009","author":"Film and Publication Board.","key":"2024101411141050700_ref14"},{"key":"2024101411141050700_ref15","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/wacv.2017.79","volume-title":"2017 IEEE Winter Conference on Applications of Computer Vision (WACV)","author":"Ganguly","year":"2017"},{"key":"2024101411141050700_ref16","doi-asserted-by":"crossref","first-page":"3356","DOI":"10.18653\/v1\/2020.findings-emnlp.301","article-title":"Realtoxicityprompts: evaluating neural toxic degeneration in language models","volume-title":"Findings of the Association for Computational Linguistics: EMNLP 2020","author":"Gehman","year":"2020"},{"key":"2024101411141050700_ref17","article-title":"New Zealand mosque shooter is a white supremacist angry at immigrants, documents and video reveal","author":"Gelineau","year":"2019","journal-title":"Chicago Tribune."},{"key":"2024101411141050700_ref18","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.jnlssr.2023.08.001","article-title":"AIGC challenges and opportunities related to public safety: a case study of ChatGPT","volume":"4","author":"Guo","year":"2023","journal-title":"Journal of Safety Science and Resilience"},{"key":"2024101411141050700_ref19","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1201\/9781003278290-10","volume-title":"How to Make a Chatbot that isn't Racist or Sexist. Ethics of Data and Analytics","author":"Heaven","year":"2022"},{"key":"2024101411141050700_ref20","first-page":"588","volume-title":"Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"Hovy","year":"2021"},{"article-title":"RL\u2014proximal policy optimization (PPO) explained","year":"2018","author":"Hui","key":"2024101411141050700_ref21"},{"year":"2017","author":"Infocomm Media Development Authority","key":"2024101411141050700_ref23"},{"key":"2024101411141050700_ref24","doi-asserted-by":"publisher","first-page":"132723","DOI":"10.1109\/ACCESS.2021.3114389","article-title":"Keeping children safe online with limited resources: analyzing what is seen and heard","volume":"9","author":"Jevremovic","year":"2021","journal-title":"IEEE Access"},{"key":"2024101411141050700_ref26","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1093\/iwc\/iwac019","article-title":"VIARS: an intelligent voice agent to prevent inappropriate content display for restricted users","volume":"33","author":"Kang","year":"2021","journal-title":"Interact. Comput."},{"volume-title":"Classificeren","year":"2017","author":"Kijkwijzer","key":"2024101411141050700_ref27"},{"key":"2024101411141050700_ref28","doi-asserted-by":"publisher","first-page":"100540","DOI":"10.1016\/j.ijcci.2022.100540","article-title":"Examining voice assistants in the context of children\u2019s speech","volume":"34","author":"Kim","year":"2022","journal-title":"International Journal of Child-Computer Interaction"},{"key":"2024101411141050700_ref29","first-page":"113","article-title":"Erroneous reactions of voice assistants \u201cin the wild\u201d\u2013first analyses","volume":"103","author":"Kisser","year":"2022","journal-title":"Elektronische Sprachsignalverarbeitung"},{"key":"2024101411141050700_ref30","doi-asserted-by":"publisher","first-page":"102643","DOI":"10.1016\/j.ipm.2021.102643","article-title":"Offensive, aggressive, and hate speech analysis: from data-centric to human-centered approach","volume":"58","author":"Koco\u0144","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"2024101411141050700_ref31","first-page":"1","article-title":"Beyond the representation of the female nude","author":"Lagana","year":"2007","journal-title":"Times of Malta"},{"volume-title":"Online censors are a barrier to sex education","year":"2016","author":"Oosterhoff","key":"2024101411141050700_ref32"},{"key":"2024101411141050700_ref48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3057733","article-title":"Adult image and video recognition by a deep multicontext network and fine-to-coarse strategy","volume":"8","author":"Ou","year":"2017","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"year":"2017","author":"Pan European Game Information","key":"2024101411141050700_ref33"},{"key":"2024101411141050700_ref34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3230833.3232809","volume-title":"Proceedings of the 13th International Conference on Availability, Reliability and Security","author":"Peixoto","year":"2018"},{"volume-title":"Modeling life: Art models speak about nudity, sexuality, and the creative process","year":"2012","author":"Phillips","key":"2024101411141050700_ref35"},{"key":"2024101411141050700_ref36","doi-asserted-by":"publisher","first-page":"2853","DOI":"10.1145\/3027063.3053246","volume-title":"Proceedings of the 2017 CHI conference extended abstracts on human factors in computing systems","author":"Purington","year":"2017"},{"year":"2005","author":"Rousso","key":"2024101411141050700_ref37"},{"article-title":"Do you see what I see? Capabilities and limits of automated multimedia content analysis","year":"2021","author":"Shenkman","key":"2024101411141050700_ref39"},{"article-title":"\u201cAre you home alone?\u201d\u201c yes\u201d disclosing security and privacy vulnerabilities in Alexa skills","year":"2020","author":"Su","key":"2024101411141050700_ref40"},{"year":"2017","author":"TV Parental Guidelines Monitoring Board","key":"2024101411141050700_ref41"},{"key":"2024101411141050700_ref42","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/3611643.3616310","volume-title":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Wan","year":"2023"},{"key":"2024101411141050700_ref43","first-page":"280","article-title":"A survey on ChatGPT: AI-generated contents, challenges, and solutions","volume-title":"IEEE Open Journal of the Computer Society","author":"Wang","year":"2023"},{"article-title":"Ethical and social risks of harm from language models","year":"2021","author":"Weidinger","key":"2024101411141050700_ref44"},{"key":"2024101411141050700_ref45","first-page":"1","volume-title":"Proceedings of the 23rd ACM International Conference on Intelligent Virtual Agents","author":"Zamani","year":"2023"},{"key":"2024101411141050700_ref46","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2304.06488","article-title":"One small step for generative ai, one giant leap for agi: a complete survey on chatgpt in aigc era","author":"Zhang","year":"2023"},{"key":"2024101411141050700_ref47","doi-asserted-by":"publisher","first-page":"103446","DOI":"10.1016\/j.ipm.2023.103446","article-title":"Multiheaded deep learning chatbot for increasing production and marketing","volume":"60","author":"Zheng","year":"2023","journal-title":"Inf. Process. Manag."}],"container-title":["Interacting with Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/iwc\/advance-article-pdf\/doi\/10.1093\/iwc\/iwae034\/59739244\/iwae034.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/iwc\/advance-article-pdf\/doi\/10.1093\/iwc\/iwae034\/59739244\/iwae034.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T11:14:35Z","timestamp":1728904475000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/iwc\/article\/36\/6\/406\/7717700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,21]]},"references-count":45,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,7,21]]},"published-print":{"date-parts":[[2024,10,14]]}},"URL":"https:\/\/doi.org\/10.1093\/iwc\/iwae034","relation":{},"ISSN":["0953-5438","1873-7951"],"issn-type":[{"type":"print","value":"0953-5438"},{"type":"electronic","value":"1873-7951"}],"subject":[],"published-other":{"date-parts":[[2024,11]]},"published":{"date-parts":[[2024,7,21]]}}}