PromptRiskDBThreat intelligence atlas
AI Risk

Labor Manipulation, Theft, and Displacement

Major tech companies have also been the dominant players in developing new generative AI systems because training generative AI models requires massive swaths of data, computing power, and technical and financial resources. Their market dominance has a ripple effect on the labor market, affecting both workers within these companies and those implementing their generative AI products externally. With so much concen...

AI Risk6. Socioeconomic and Environmental6.2 > Increased inequality and decline in employment quality3 - Other

Record summary

A quick snapshot of what this page covers.

Techniques0Attack methods connected to this risk.
Mitigations0Defenses that may help with related attacks.
Domain6. Socioeconomic and EnvironmentalThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

Major tech companies have also been the dominant players in developing new generative AI systems because training generative AI models requires massive swaths of data, computing power, and technical and financial resources. Their market dominance has a ripple effect on the labor market, affecting both workers within these companies and those implementing their generative AI products externally. With so much concentrated market power, expertise, and investment resources, these handful of major tech companies employ most of the research and development jobs in the generative AI field. The power to create jobs also means these tech companies can slash jobs in the face of economic uncertainty. And externally, the generative AI tools these companies develop have the potential to affect white-collar office work intended to increase worker productivity and automate tasks

Domain6. Socioeconomic and Environmental
Subdomain6.2 > Increased inequality and decline in employment quality
Entity1 - Human
Intent1 - Intentional
Timing3 - Other
CategoryLabor Manipulation, Theft, and Displacement
Subcategoryn/a

Suggested mitigations

Defenses that may help with related attacks.

No propagated mitigations. No defense is available through the connected attack methods.

Source

Research source for this risk, when available.