00% 10% 20% 30% 40% 50% 60%
Advance of Adversarial capabilties-phishing,malware development,deepfakes Data leakes-exposure of personally identifiable information through generative AI Increased compalexity of security governance Technical security of the ALI systems themselves Software supply-chain and code development risk-potential backdoors Legal concern of intellectual property and liabillty
Share of Respondents