Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

DO THE HEATMAP AND MAKE KEYWORDS FROM PROMPS TO RECOGNIZE EACH RISKGENERIC PHASE AGNOSTIC Mappling of RI ke GenAI R 1 . Unwanted Outputs, Literal

DO THE HEATMAP AND MAKE KEYWORDS FROM PROMPS TO RECOGNIZE EACH RISKGENERIC PHASE AGNOSTIC
Mappling of RIke GenAI
R1. Unwanted Outputs, Literal Memory Bias
R2. Lark of Quality, Factuality, Hallucinating
R3. Lack of Timeliness
R4. Lack of Reproduciblity and Explainability
R.5. Lack of Security of Generated Code
R6. Incosrect Response to Specific Inputs
R7. Automation Bias
R8. Susceptaility to Interpreting Text as Instruction
R9. Lack of Confidentiality of Input Data
R10. Self-reinforcing Impacts and Model Collapse
R11. Dependence on the Model Developer/Operatar
R12. Misinformation (Fake News):
R13. Social Engineering:
R14. Re-identification of Individuals from Anonymous
R15. Knowledge Gathering and Processing in the Con! H
R16. Malware Creation and Improverment:
R17. Malware Placement:
R18. RCE (Remate Code Execution) attacks:
R19. Attackers can Reconstruct a Moders Training Dat
R20. Model Subversicn Altacks:
R21. Member Reasoning Attacks:
R22. Homograph Altlacks:
R26. Data Poisoning Atlacks:
R27. Model Poisaning Altacks:
R2B. Learning Transfer Atlacks:
Mappling of Rlik Category (Hlgh, Medlum, Low)
High
Medium
Medium
High
High
Medium
Medium
Medium
High
Medium
Medium
High
Medium
.HighHigh
High
Medium
High
Medium
Medium
Low
Medium
Medium
Low
Prompte per Rlsk Category (To be deflined)
(Bias, Discrimination, Hate Speech)
(Inaccuracy, Misinformation, Plausibility)
(Outdated Information)
(Transparency, Explainability)
(Vulnerabilities, Explaits, Security Bresches)
(Errors, Misinterpretations)
What is the rationale behind this decision?", "Are there alternative solutions not considered by the Al?", "How confident are you in the Al's recommendation?", What are the potential risks or downsides of follow
7s this a command or just a statement?", "Should I take action based on this text?". "What is the intended meaning of this input?", "Are there any potential risks of misinterpreting this text?"
(Privacy Breach)
(Performance Degradation, Bias Amplification)
(Bias, Control)
(Falsehoods, Deception)
(Manipulation, Deception)
(Privacy Breach, Anonymity)
(Privacy, Bias)
(Cybersecurity)
(Cytersecurity)
(Cybersecurity)
(Privacy, Security)
(Robustress, Security)
(Privacy, Security)
(Security)
(Data)
(Robustress)
(Intellectual Praperty, Security)*** Risk Identification Prompts:
R1: Unwanted Outputs, Literal Memory Bias
"Does the model consistently produce outputs that are unbiased, fair, and free from discriminatory language?"
"Has the training data been thoroughly evaluated for potential biases or harmful stereotypes?"
"Are there mechanisms in place to identify and correct unwanted outputs in real-time?"
R2: Lack of Quality, Factuality, Hallucinating
"How often does the model generate inaccurate, false, or misleading information?"
"Are there reliable mechanisms in place to fact-check and verify the accuracy of the model's outputs?"
"Does the model clearly indicate when it's uncertain about the accuracy of its responses?"
R3: Lack of Timeliness
"How frequently is the model's training data updated to ensure it reflects the latest information?"
"Does the model have access to real-time or near-real-time data sources when required?"
"Are there mechanisms in place to alert users when the model's information may be outdated?"
R4: Lack of Reproducibility and Explainability
"Can the model's decision-making process be clearly explained and understood by humans?"
"Are there tools or techniques available to interpret the model's reasoning and identify potential biases or errors?"
"Does the model provide explanations for its outputs in a way that is understandable to users?"
R5: Lack of Security of Generated Code
"Has the AI-generated code been thoroughly tested for vulnerabilities and potential security flaws?"
"Are secure coding practices and frameworks being followed during code generation?"
"Are there mechanisms in place to monitor and patch vulnerabilities in the generated code?"
R6: Incorrect Response to Specific Inputs
"How often does the model provide incorrect or inappropriate responses to user inputs?"
"Does the model have robust error handling mechanisms to address unexpected or invalid inputs?"
"Are there procedures in place to identify and correct errors in the model's responses?"
R7: Automation Bias
"To what extent do users rely on the AI system's outputs without critical evaluation?"
"Are users aware of the limitations of the AI system and its potential for errors?"
"Are there mechanisms in place to encourage human oversight and critical thinking when interacting with the AI system?"
R8: Susceptibility to Interpreting Text as Instruction
"Can the AI system reliably distinguish between instructions and general text input?"
"Are there measures in place to prevent the system from executing unintended actions based on misinterpretations?"
"Does the system provide feedback or confirmation mechanisms to verify the intend R17. Malwa
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction To Data Mining

Authors: Pang Ning Tan, Michael Steinbach, Vipin Kumar

1st Edition

321321367, 978-0321321367

More Books

Students also viewed these Databases questions

Question

Briefly describe Aristotles four kinds of causation.

Answered: 1 week ago