Categories: Cybersecurity

Ethics and ownership of AI-powered identities

With the tremendous advances in how AI/ML technologies are being deployed, one of the most exciting, controversial, and rapidly evolving advances relates to human voice. One particular example jumps out as encapsulating the complex of issues and emotions tied to AI-powered voices.

Last summer, AI technology was used to give voice to some of the late Anthony Bourdain’s writings, words that he never spoke or read aloud but were nevertheless his; voice cloning technology brought the text to life in Roadrunner: A Film About Anthony Bourdain. Some in the audience felt duped that it wasn’t really Bourdain, others thought the move was a misstep as Bourdain was not alive to give permission to manipulate his voice in such a way, while many felt it was simply a creative storytelling device.

The Bourdain example highlights two key issues that will rise to the forefront of how AI-based voice technologies will be used in the future. On one hand, there are questions about who has ownership of a voice, and therefore control over how it might be used now and in the future. On the other is the ethical issue: is it morally right to allow someone’s voice to be used in the public domain after his or her death when he or she has no control over how it will be used or what is said?

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

1 semaine ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

2 semaines ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

2 semaines ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

2 semaines ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

2 semaines ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

2 semaines ago

This website uses cookies.