Organisations may use those data for corporate profits without considering the privacy of customers, which might further lead to breaches of personally-identifiable information (Posey, Raja, Crossler, & Burns, 2017). Responsible IS studies should be conducted to examine the occurrence context, ...
input (jailbreak) to deceive your LLM application into performing unintended actions, such as revealing personally identifiable information (PII). Generally, adversarial attacks may result results in data leakage, unauthorized access, or other security breaches. Some examples of adver...