BackEnvironment - Pre-Deployment
Environment - Pre-Deployment
"While it is most likely that any advanced intelligent software will be directly designed or evolved, it is also possible that we will obtain it as a complete package from some unknown source. For example, an AI could be extracted from a signal obtained in SETI (Search for Extraterrestrial Intelligence) research, which is not guaranteed to be human friendly (Carrigan Jr 2004, Turchin March 15, 2013)."(p. 145)
Entity— Who or what caused the harm
Intent— Whether the harm was intentional or accidental
Timing— Whether the risk is pre- or post-deployment
Other risks from Yampolskiy (2016) (7)
On Purpose - Pre-Deployment
2.2 AI system security vulnerabilities and attacksHumanIntentionalPre-deployment
On Purpose - Post Deployment
4.3 Fraud, scams, and targeted manipulationHumanIntentionalPost-deployment
By Mistake - Pre-Deployment
7.1 AI pursuing its own goals in conflict with human goals or valuesHumanUnintentionalPre-deployment
By Mistake - Post-Deployment
7.3 Lack of capability or robustnessAI systemUnintentionalPost-deployment
Environment - Post-Deployment
7.0 AI System Safety, Failures & LimitationsOtherUnintentionalPost-deployment
Independently - Pre-Deployment
7.0 AI System Safety, Failures & LimitationsAI systemIntentionalPre-deployment