{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:42:13Z","timestamp":1776109333253,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,21]]},"DOI":"10.1145\/3537674.3554742","type":"proceedings-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T16:08:30Z","timestamp":1662566910000},"page":"23-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Availability of Voice Deepfake Technology and its Impact for Good and Evil"],"prefix":"10.1145","author":[{"given":"Naroa","family":"Amezaga","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology, USA"}]},{"given":"Jeremy","family":"Hajek","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9194050"},{"issue":"4","key":"e_1_3_2_1_2_1","first-page":"33","article-title":"The Uncanny Valley","volume":"7","author":"Mori M.","year":"1970","unstructured":"Mori , M. ( 1970 ). The Uncanny Valley . Energy , 7 ( 4 ), 33 \u2014 35 . Mori, M. (1970). The Uncanny Valley. Energy, 7(4), 33\u201435.","journal-title":"Energy"},{"key":"e_1_3_2_1_3_1","volume-title":"About Three-Quarters of Americans Favor Steps to Restrict Altered Videos and Images","author":"Gottfried J.","year":"2019","unstructured":"Gottfried , J. (2019, June 14). About Three-Quarters of Americans Favor Steps to Restrict Altered Videos and Images . Pew Research Center . https:\/\/www.pewresearch.org\/fact-tank\/ 2019 \/06\/14\/about-three-quarters-of-americans-favor-steps-to-restrict-altered-videos-and-images\/ Gottfried, J. (2019, June 14). About Three-Quarters of Americans Favor Steps to Restrict Altered Videos and Images. Pew Research Center. https:\/\/www.pewresearch.org\/fact-tank\/2019\/06\/14\/about-three-quarters-of-americans-favor-steps-to-restrict-altered-videos-and-images\/"},{"key":"e_1_3_2_1_4_1","unstructured":"AI Oodles. (2020 July 7). Copy That: Realistic Voice Cloning with Artificial Intelligence. https:\/\/artificialintelligence.oodles.io\/blogs\/voice-cloning-with-artificial-intelligence\/.  AI Oodles. (2020 July 7). Copy That: Realistic Voice Cloning with Artificial Intelligence. https:\/\/artificialintelligence.oodles.io\/blogs\/voice-cloning-with-artificial-intelligence\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Seif G. (2021 February 14). You can now speak using someone else's voice with Deep Learning. Medium. https:\/\/towardsdatascience.com\/you-cannow-speak-using-someone-elses-voice-with-deep-learning-8be24368fa2b.  Seif G. (2021 February 14). You can now speak using someone else's voice with Deep Learning. Medium. https:\/\/towardsdatascience.com\/you-cannow-speak-using-someone-elses-voice-with-deep-learning-8be24368fa2b."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Eighth Conference on Computation, Communication, Aesthetics. https:\/\/www.researchgate.net\/publication\/342924151_The_Cultural_Origins_of_Voice_Cloning","author":"Napolitano D.","year":"2020","unstructured":"Napolitano , D. ( 2020 ). The Cultural Origins of Voice Cloning . Proceedings of the Eighth Conference on Computation, Communication, Aesthetics. https:\/\/www.researchgate.net\/publication\/342924151_The_Cultural_Origins_of_Voice_Cloning Napolitano, D. (2020). The Cultural Origins of Voice Cloning. Proceedings of the Eighth Conference on Computation, Communication, Aesthetics. https:\/\/www.researchgate.net\/publication\/342924151_The_Cultural_Origins_of_Voice_Cloning"},{"key":"e_1_3_2_1_7_1","unstructured":"Johnson D. (2020 July 31). Audio Deepfakes: Can Anyone Tell If They're Fake? https:\/\/www.howtogeek.com\/682865\/audio-deepfakes-can-anyonetell-if-they-are-fake\/.  Johnson D. (2020 July 31). Audio Deepfakes: Can Anyone Tell If They're Fake? https:\/\/www.howtogeek.com\/682865\/audio-deepfakes-can-anyonetell-if-they-are-fake\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Machine Learning in Educational Technology. https:\/\/doi.org\/10.5772\/intechopen.72906","author":"Nafea I. T.","year":"2018","unstructured":"Nafea , I. T. ( 2018 ). Machine Learning in Educational Technology. https:\/\/doi.org\/10.5772\/intechopen.72906 10.5772\/intechopen.72906 Nafea, I. T. (2018). Machine Learning in Educational Technology. https:\/\/doi.org\/10.5772\/intechopen.72906"},{"key":"e_1_3_2_1_9_1","unstructured":"Speech synthesis. (n.d.). https:\/\/www.cs.mcgill.ca\/\u223crwest\/wikispeedia\/wpcd\/wp\/s\/Speech_synthesis.htm  Speech synthesis. (n.d.). https:\/\/www.cs.mcgill.ca\/\u223crwest\/wikispeedia\/wpcd\/wp\/s\/Speech_synthesis.htm"},{"key":"e_1_3_2_1_10_1","unstructured":"History and Development of Speech Synthesis. (n.d.). http:\/\/research.spa.aalto.fi\/publications\/theses\/lemmetty_mst\/chap2.html  History and Development of Speech Synthesis. (n.d.). http:\/\/research.spa.aalto.fi\/publications\/theses\/lemmetty_mst\/chap2.html"},{"key":"e_1_3_2_1_11_1","unstructured":"Saini M. (2020 February 6). Voice Cloning Using Deep Learning. Medium. https:\/\/medium.com\/the-research-nest\/voice-cloning-using-deep-learning-166f1b8d8595.  Saini M. (2020 February 6). Voice Cloning Using Deep Learning. Medium. https:\/\/medium.com\/the-research-nest\/voice-cloning-using-deep-learning-166f1b8d8595."},{"key":"e_1_3_2_1_12_1","unstructured":"Vicomtech. (2021 February 24). Voice Cloning. Speech and Language Solutions. https:\/\/www.speechandlanguagesolutions.com\/voice-cloning\/.  Vicomtech. (2021 February 24). Voice Cloning. Speech and Language Solutions. https:\/\/www.speechandlanguagesolutions.com\/voice-cloning\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Mutchler A. (2021 March 26). Voice Assistant Timeline: A Short History of the Voice Revolution. Voicebot.ai. https:\/\/voicebot.ai\/2017\/07\/14\/timelinevoice-assistants-short-history-voice-revolution\/.  Mutchler A. (2021 March 26). Voice Assistant Timeline: A Short History of the Voice Revolution. Voicebot.ai. https:\/\/voicebot.ai\/2017\/07\/14\/timelinevoice-assistants-short-history-voice-revolution\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Blackboard. (n.d.). Alexa Education Skill Integration. https:\/\/help.blackboard.com\/Learn\/Administrator\/SaaS\/Integrations\/Alexa_Education_Skill.  Blackboard. (n.d.). Alexa Education Skill Integration. https:\/\/help.blackboard.com\/Learn\/Administrator\/SaaS\/Integrations\/Alexa_Education_Skill."},{"key":"e_1_3_2_1_15_1","unstructured":"Cerence. (2019 December 30). Cerence Introduces My Car My Voice \u2013 New Voice Clone Solution to Personalize the In-Car Voice Assistant. https:\/\/www.cerence.com\/news-releases\/news-release-details\/cerenceintroduces-my-car-my-voice-new-voice-clone-solution\/.  Cerence. (2019 December 30). Cerence Introduces My Car My Voice \u2013 New Voice Clone Solution to Personalize the In-Car Voice Assistant. https:\/\/www.cerence.com\/news-releases\/news-release-details\/cerenceintroduces-my-car-my-voice-new-voice-clone-solution\/."},{"key":"e_1_3_2_1_16_1","unstructured":"C++ vs Java vs Python. (n.d.). https:\/\/www.tutorialspoint.com\/cplusplusvs-java-vs-python.  C++ vs Java vs Python. (n.d.). https:\/\/www.tutorialspoint.com\/cplusplusvs-java-vs-python."},{"key":"e_1_3_2_1_17_1","unstructured":"PyPI. (2017 December 5). SpeechRecognition. https:\/\/pypi.org\/project\/SpeechRecognition\/.  PyPI. (2017 December 5). SpeechRecognition. https:\/\/pypi.org\/project\/SpeechRecognition\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Drake M. (2019 March 19). SQLite vs MySQL vs PostgreSQL: A Comparison of Relational Database Management Systems. DigitalOcean. https:\/\/www.digitalocean.com\/community\/tutorials\/sqlite-vs-mysql-vspostgresql-a-comparison-of-relational-database-management-systems.  Drake M. (2019 March 19). SQLite vs MySQL vs PostgreSQL: A Comparison of Relational Database Management Systems. DigitalOcean. https:\/\/www.digitalocean.com\/community\/tutorials\/sqlite-vs-mysql-vspostgresql-a-comparison-of-relational-database-management-systems."},{"key":"e_1_3_2_1_19_1","unstructured":"Jemine C. (2019 June 25). Master thesis: Real-Time Voice Cloning. https:\/\/matheo.uliege.be\/handle\/2268.2\/6801.  Jemine C. (2019 June 25). Master thesis: Real-Time Voice Cloning. https:\/\/matheo.uliege.be\/handle\/2268.2\/6801."},{"key":"e_1_3_2_1_20_1","unstructured":"Jemine C. (2019 June 25). Real-Time-Voice-Cloning. GitHub. https:\/\/github.com\/CorentinJ\/Real-Time-Voice-Cloning.  Jemine C. (2019 June 25). Real-Time-Voice-Cloning. GitHub. https:\/\/github.com\/CorentinJ\/Real-Time-Voice-Cloning."},{"key":"e_1_3_2_1_21_1","unstructured":"PyAudio: PortAudio v19 Python Bindings. (n.d.). http:\/\/people.csail.mit.edu\/hubert\/pyaudio\/#downloads.  PyAudio: PortAudio v19 Python Bindings. (n.d.). http:\/\/people.csail.mit.edu\/hubert\/pyaudio\/#downloads."},{"key":"e_1_3_2_1_22_1","volume-title":"Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis. CoRR, abs\/1806.04558. https:\/\/arxiv.org\/pdf\/1806.04558.pdf","author":"Jia Y.","year":"2018","unstructured":"Jia , Y. , Zhang , Y. , Weiss , R. J. , Wang , Q. , Shen , J. , Ren , F. , Chen , Z. , Nguyen , P. , Pang , R. , Lopez Moreno , I. & Wu , Y. ( 2018 ). Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis. CoRR, abs\/1806.04558. https:\/\/arxiv.org\/pdf\/1806.04558.pdf Jia, Y., Zhang, Y., Weiss, R. J., Wang, Q., Shen, J., Ren, F., Chen, Z., Nguyen, P., Pang, R., Lopez Moreno, I. & Wu, Y. (2018). Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis. CoRR, abs\/1806.04558. https:\/\/arxiv.org\/pdf\/1806.04558.pdf"},{"key":"e_1_3_2_1_23_1","volume-title":"Resemblyzer. GitHub. https:\/\/github.com\/resembleai\/Resemblyzer","author":"Resemble AI.","year":"2020","unstructured":"Resemble - AI. ( 2020 ). Resemblyzer. GitHub. https:\/\/github.com\/resembleai\/Resemblyzer . Resemble-AI. (2020). Resemblyzer. GitHub. https:\/\/github.com\/resembleai\/Resemblyzer."},{"key":"e_1_3_2_1_24_1","unstructured":"Springwise. (2020 October 8). Pros and Cons: Deepfake technology and AI avatars. https:\/\/www.springwise.com\/pros-cons\/deepfake-technology-aiavatars.  Springwise. (2020 October 8). Pros and Cons: Deepfake technology and AI avatars. https:\/\/www.springwise.com\/pros-cons\/deepfake-technology-aiavatars."},{"key":"e_1_3_2_1_25_1","unstructured":"Vazquez L. (n.d.). RECOMMENDATIONS FOR REGULATION OF DEEPFAKES IN THE U.S.: DEEPFAKE LAWS SHOULD PROTECT EVERYONE NOT ONLY PUBLIC FIGURES. https:\/\/www.ebglaw.com\/content\/uploads\/2021\/04\/Reif-Fellowship-2021- Essay-2-Recommendation-for-Deepfake-Law.pdf.  Vazquez L. (n.d.). RECOMMENDATIONS FOR REGULATION OF DEEPFAKES IN THE U.S.: DEEPFAKE LAWS SHOULD PROTECT EVERYONE NOT ONLY PUBLIC FIGURES. https:\/\/www.ebglaw.com\/content\/uploads\/2021\/04\/Reif-Fellowship-2021- Essay-2-Recommendation-for-Deepfake-Law.pdf."},{"key":"e_1_3_2_1_26_1","unstructured":"The United States Department of Justice. (2020 November 16). Identity Theft. https:\/\/www.justice.gov\/criminal-fraud\/identity-theft\/identity-theft-and-identity-fraud.  The United States Department of Justice. (2020 November 16). Identity Theft. https:\/\/www.justice.gov\/criminal-fraud\/identity-theft\/identity-theft-and-identity-fraud."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42438-018-0007-6"},{"key":"e_1_3_2_1_28_1","volume-title":"December 27). When celebrities seek copyrights","author":"Gupta A.","unstructured":"Gupta , A. (2010 , December 27). When celebrities seek copyrights . The Financial Express . https:\/\/www.financialexpress.com\/archive\/whencelebrities-seek-copyrights\/729569\/. Gupta, A. (2010, December 27). When celebrities seek copyrights. The Financial Express. https:\/\/www.financialexpress.com\/archive\/whencelebrities-seek-copyrights\/729569\/."},{"key":"e_1_3_2_1_29_1","unstructured":"Legal Information Institute. (n.d.). Trademark. https:\/\/www.law.cornell.edu\/wex\/trademark.  Legal Information Institute. (n.d.). Trademark. https:\/\/www.law.cornell.edu\/wex\/trademark."},{"key":"e_1_3_2_1_30_1","unstructured":"International Trademark Association. (n.d.). Right of Publicity. https:\/\/www.inta.org\/topics\/right-of-publicity\/.  International Trademark Association. (n.d.). Right of Publicity. https:\/\/www.inta.org\/topics\/right-of-publicity\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Wiggers K. (2020 January 30). Voice cloning experts cover crime positive use cases and safeguards. VentureBeat. https:\/\/venturebeat.com\/2020\/01\/29\/ftc-voice-cloning-seminar-crime-usecases-safeguards-ai-machine-learning\/.  Wiggers K. (2020 January 30). Voice cloning experts cover crime positive use cases and safeguards. VentureBeat. https:\/\/venturebeat.com\/2020\/01\/29\/ftc-voice-cloning-seminar-crime-usecases-safeguards-ai-machine-learning\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Chipman J. Ferraro M. & Preston S. (2019 December 24). First Federal Legislation on Deepfakes Signed into Law. JD Supra. https:\/\/www.jdsupra.com\/legalnews\/first-federal-legislation-on-deepfakes42346\/.  Chipman J. Ferraro M. & Preston S. (2019 December 24). First Federal Legislation on Deepfakes Signed into Law. JD Supra. https:\/\/www.jdsupra.com\/legalnews\/first-federal-legislation-on-deepfakes42346\/."},{"key":"e_1_3_2_1_33_1","unstructured":"Gadney G. (2021 July 8). Clone Synthetic AI Voices with Neural Text to Speech. Resemble AI. https:\/\/www.resemble.ai\/.  Gadney G. (2021 July 8). Clone Synthetic AI Voices with Neural Text to Speech. Resemble AI. https:\/\/www.resemble.ai\/."}],"event":{"name":"SIGITE '22: The 23rd Annual Conference on Information Technology Education","location":"Chicago IL USA","acronym":"SIGITE '22","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"]},"container-title":["Proceedings of the 23rd Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537674.3554742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3537674.3554742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:50Z","timestamp":1750186970000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537674.3554742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,21]]},"references-count":33,"alternative-id":["10.1145\/3537674.3554742","10.1145\/3537674"],"URL":"https:\/\/doi.org\/10.1145\/3537674.3554742","relation":{},"subject":[],"published":{"date-parts":[[2022,9,21]]},"assertion":[{"value":"2022-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}