PromptRiskDBThreat intelligence atlas
AI Risk

Avenues for exploiting user trust and accessing more private information

Anticipated risk: "In conversation, users may reveal private information that would otherwise be difficult to access, such as opinions or emotions. Capturing such information may enable downstream applications that violate privacy rights or cause harm to users, e.g. via more effective recommendations of addictive applications. In one study, humans who interacted with a ‘human-like’ chatbot disclosed more private i...

AI Risk5. Human-Computer Interaction5.1 > Overreliance and unsafe use2 - Post-deployment

Record summary

A quick snapshot of what this page covers.

Techniques4Attack methods connected to this risk.
Mitigations7Defenses that may help with related attacks.
Domain5. Human-Computer InteractionThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

Anticipated risk: "In conversation, users may reveal private information that would otherwise be difficult to access, such as opinions or emotions. Capturing such information may enable downstream applications that violate privacy rights or cause harm to users, e.g. via more effective recommendations of addictive applications. In one study, humans who interacted with a ‘human-like’ chatbot disclosed more private information than individuals who interacted with a ‘machine-like’ chatbot [87]."

Domain5. Human-Computer Interaction
Subdomain5.1 > Overreliance and unsafe use
Entity3 - Other
Intent2 - Unintentional
Timing2 - Post-deployment
CategoryRisk area 5: Human-Computer Interaction Harms
SubcategoryAvenues for exploiting user trust and accessing more private information

Suggested mitigations

Defenses that may help with related attacks.

User Training

Business and Data UnderstandingData Preparation+4 more
LifecycleBusiness and Data Understanding + 5 moreCategoryPolicy

Deepfake Detection

DeploymentMonitoring and Maintenance+2 more
LifecycleDeployment + 3 moreCategoryTechnical - ML

AI Telemetry Logging

DeploymentMonitoring and Maintenance
LifecycleDeployment + 1 moreCategoryTechnical - Cyber

Source

Research source for this risk, when available.