PromptRiskDBThreat intelligence atlas
AI Risk

Demographic diversity of researchers

"The AI research establishment inherits patterns of under-representation that are dominant in most technical elds. In North America, large parts of professional AI research require a Ph.D., yet less than 25% of Ph.D. computer scientists are women, and fewer than 2% are Black or African American [608]. This holds globally and outside the research community: LinkedIn data suggests that only 22% of AI professionals a...

AI Risk6. Socioeconomic and Environmental6.1 > Power centralization and unfair distribution of benefits3 - Other

Record summary

A quick snapshot of what this page covers.

Techniques0Attack methods connected to this risk.
Mitigations0Defenses that may help with related attacks.
Domain6. Socioeconomic and EnvironmentalThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

"The AI research establishment inherits patterns of under-representation that are dominant in most technical elds. In North America, large parts of professional AI research require a Ph.D., yet less than 25% of Ph.D. computer scientists are women, and fewer than 2% are Black or African American [608]. This holds globally and outside the research community: LinkedIn data suggests that only 22% of AI professionals are women [161]. Since the vast majority of AI practitioners work for private companies, limited corporate statistics on gender and racial diversity hinder a full understanding of the situation [402], but those few statistics that exist are not encouraging: only 5% of Google and 7% of Microsoft employees are Black or African American, with potentially even lower representation at the more senior levels [212, 384]."

Domain6. Socioeconomic and Environmental
Subdomain6.1 > Power centralization and unfair distribution of benefits
Entity3 - Other
Intent3 - Other
Timing3 - Other
CategoryWithin-country issues: domestic inequality
SubcategoryDemographic diversity of researchers

Suggested mitigations

Defenses that may help with related attacks.

No propagated mitigations. No defense is available through the connected attack methods.

Source

Research source for this risk, when available.