Resistance to Misuse
Prohibiting the misuse by malicious attackers to do harm(p. 8)
Sub-categories (4)
Propaganda
LLMs can be leveraged, by malicious users, to proactively generate propaganda information that can facilitate the spreading of a target
4.1 Disinformation, surveillance, and influence at scaleCyberattack
ability of LLMs to write reasonably good-quality code with extremely low cost and incredible speed, such great assistance can equally facilitate malicious attacks. In particular, malicious hackers can leverage LLMs to assist with performing cyberattacks leveraged by the low cost of LLMs and help with automating the attacks.
4.2 Cyberattacks, weapon development or use, and mass harmSocial-Engineering
psychologically manipulating victims into performing the desired actions for malicious purposes
4.3 Fraud, scams, and targeted manipulationCopyright
The memorization effect of LLM on training data can enable users to extract certain copyright-protected content that belongs to the LLM’s training data.
6.3 Economic and cultural devaluation of human effortOther risks from Liu et al. (2024) (34)
Reliability
3.1 False or misleading informationReliability > Misinformation
3.1 False or misleading informationReliability > Hallucination
3.1 False or misleading informationReliability > Inconsistency
7.3 Lack of capability or robustnessReliability > Miscalibration
3.1 False or misleading informationReliability > Sychopancy
3.1 False or misleading information