{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:54:36Z","timestamp":1767678876002,"version":"3.48.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,19]]},"DOI":"10.1109\/aiccsa66935.2025.11315218","type":"proceedings-article","created":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T18:35:55Z","timestamp":1767638155000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Ethical Implications regulation of Deep fake: A business process approach"],"prefix":"10.1109","author":[{"given":"Salma","family":"Elhag","sequence":"first","affiliation":[{"name":"King Abdulaziz University,Faculty of Computing and Information Technology,Department of Information Systems,Jeddah,Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Ethical impact assessment","author":"Wright","year":"2015","journal-title":"Trilateral Res. Consult"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101133"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.55549\/epstem.1371792"},{"year":"2024","key":"ref4","article-title":"Safety and Glo6al Governance of Generativ.e Al Report"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1108\/IJLSS-05-2013-0028"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/jiplp\/jpz167"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE59459.2023.10468370"},{"key":"ref8","first-page":"1","article-title":"Facing Reality? Law Enforcement and The Challenge of Deepfakes","volume-title":"Obs. Rep. from Eur. Innov. Lab","year":"2022"},{"issue":"8","key":"ref9","first-page":"10441058","article-title":"Blockchain Technology for Combating Deepfake and Protect Video\/Image Integrity","volume":"24","author":"Lee","year":"2021","journal-title":"Artic. J. Korea Multimed. Soc"},{"article-title":"How to safeguard against the menace of deepfake technology The battle against digital manipulation","year":"2024","author":"Crasto","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-024-10255-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s42454-024-00054-8"},{"key":"ref13","first-page":"0","article-title":"Deepfakes guidelines"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/58932020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151186"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154404"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3342107"},{"key":"ref18","first-page":"111747","article-title":"A forensic evaluation method for DeepFake detection using DCNN-based facial similarity scores","author":"Gil","year":"2023","journal-title":"Forensic Science International"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/app12062953"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12031"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100040"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533779"},{"article-title":"Forensic Tool for Deepfake Detection and Profile Analysis","year":"2021","author":"Nirnay","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00114"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA63115.2024.00020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e25757"},{"key":"ref27","first-page":"2320","article-title":"DEEPFAKE DETECTION ON FACE IMAGES & VIDEOS USING DEEP LEARNING","volume":"12","author":"Manish","year":"2024","journal-title":"International Journal of Creative Research Thoughts"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00443"},{"article-title":"Deepfake Low Resource Image Detection with Explainable Reporting","year":"2023","author":"Shiyam","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18576\/isl\/130212"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.61838\/kman.isslp.2.2.2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18178\/ijssh.2024.14.2.1194"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA231182"},{"article-title":"Ethical Implications of Deepfake Technology in User Interfaces","year":"2023","author":"Anand","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2023.2194665"},{"article-title":"Uppsala university Inst. for informatics and media Social Media\u2019s Take on Deepfakes: Ethical Concerns in the Public Discourse","year":"2023","author":"Bogren","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4355140"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2022.105716"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.11113\/oiji2024.12n1.297"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2478\/bjlp-2023-0010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1177\/14614448241253138"},{"article-title":"The Emerging Threats of Deepfake Attacks and Countermeasures","year":"2020","author":"Buo","key":"ref42"},{"key":"ref43","first-page":"1340","article-title":"\u2019Comparative Analysis of Deep Learning Techniques for Deepfake Detection: Evaluating Threats and Opportunities\u2019","volume":"10","author":"Kadam"}],"event":{"name":"2025 IEEE\/ACS 22nd International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2025,10,19]]},"location":"Doha, Qatar","end":{"date-parts":[[2025,10,22]]}},"container-title":["2025 IEEE\/ACS 22nd International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11315137\/11315140\/11315218.pdf?arnumber=11315218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:50:56Z","timestamp":1767678656000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11315218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/aiccsa66935.2025.11315218","relation":{},"subject":[],"published":{"date-parts":[[2025,10,19]]}}}