Record summary
A quick snapshot of what this page covers.
Techniques2Attack methods connected to this risk.
Mitigations5Defenses that may help with related attacks.
Domain5. Human-Computer InteractionThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain5. Human-Computer Interaction
Subdomain5.1 > Overreliance and unsafe use
Entity3 - Other
Intent3 - Other
Timing2 - Post-deployment
CategoryRisk of Harm through Anthropomorphic AI Assistant Design
Subcategoryn/a
Suggested mitigations
Defenses that may help with related attacks.
Limit Model Artifact Release
Business and Data UnderstandingDeployment
Control Access to AI Models and Data at Rest
Business and Data UnderstandingData Preparation+2 more
Encrypt Sensitive Information
Data PreparationML Model Engineering+1 more
AI Model Distribution Methods
Deployment
Limit Public Release of Information
Business and Data Understanding
Source
Research source for this risk, when available.
Included resource
The Ethics of Advanced AI Assistants
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
