Record summary
A quick snapshot of what this page covers.
Techniques0Attack methods connected to this risk.
Mitigations0Defenses that may help with related attacks.
Domain5. Human-Computer InteractionThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain5. Human-Computer Interaction
Subdomain5.1 > Overreliance and unsafe use
Entity2 - AI
Intent1 - Intentional
Timing2 - Post-deployment
CategoryRisk area 5: Human-Computer Interaction Harms
SubcategoryHuman-like interaction may amplify opportunities for user nudging, deception or manipulation
Suggested mitigations
Defenses that may help with related attacks.
No propagated mitigations. No defense is available through the connected attack methods.
Source
Research source for this risk, when available.
Included resource
Taxonomy of Risks posed by Language Models
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.