{"id":6740,"date":"2024-09-09T12:00:00","date_gmt":"2024-09-09T16:00:00","guid":{"rendered":"https:\/\/staging.mondata.ai\/ai-in-collaborative-environments-a-double-edged-sword\/"},"modified":"2026-03-16T16:32:18","modified_gmt":"2026-03-16T20:32:18","slug":"ai-in-collaborative-environments-a-double-edged-sword","status":"publish","type":"post","link":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/","title":{"rendered":"AI in Collaborative Environments: a Double-Edged Sword"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6740\" class=\"elementor elementor-6740 elementor-6587\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c32ad84 e-flex e-con-boxed e-con e-parent\" data-id=\"c32ad84\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6867c2f elementor-widget elementor-widget-text-editor\" data-id=\"6867c2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The excitement for AI is very high. These super assistants can produce reports and executive summaries, make suggestions and even propose strategies for your business. We can say that the advent of generative artificial intelligence will transform the way businesses create and use information. However, this technological revolution also brings increased exposure to several risks induced by this technology. Cybersecurity specialists and risk managers face an increasing complexity of the issues that require resolution.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d76ea0f elementor-widget elementor-widget-heading\" data-id=\"d76ea0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explosion in the volume of unstructured information<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51b3fc0 elementor-widget elementor-widget-text-editor\" data-id=\"51b3fc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The use of generative AI, such as Microsoft Copilot, in collaborative environments leads to a rapid increase in the volume of unstructured data. Presently, about 90% of the data generated is unstructured (text, video, images, etc.), and this proportion increases further with generative AI content creation capabilities. This proliferation is linked to the ongoing production of new content, such as reports, documents or automated real-time conversations.<\/p>\n<p>Experts estimate that this volume of unstructured data could grow by 28% yearly, doubling every two to three years in some sectors. This creates challenges for data management, including its storage, security, and efficient operation in advanced parsing systems.<\/p>\n<p>Companies need robust strategies to manage these increasing volumes of potentially sensitive data; cybersecurity solutions tailored to this reality must be implemented quickly to ensure optimal use and avoid costly cybersecurity and privacy incidents.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a96c892 elementor-widget elementor-widget-heading\" data-id=\"a96c892\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some definitions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-258f51b elementor-widget elementor-widget-text-editor\" data-id=\"258f51b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Before we go into more detail on the risks to monitor when implementing a solution like Microsoft Copilot or Google Gemini, let us look at the definition of some important AI concepts.<\/p>\n<p>An artificial intelligence model is a mathematical structure that enables predictions or content generation based on input data. In the case of LLM (large language model), such as ChatGPT, the model is a network of neurons designed to understand and generate text coherently. The model is trained based on huge amounts of text to learn the relationships between words and sentences.<\/p>\n<p>Parameters are internal model variables adjusted during training (or learning) to optimize predictions. LLMs have billions of parameters that determine how the model interprets a text input and generates an output. Parameters are adjusted during model training to minimize prediction errors regarding training data.<\/p>\n<p>Training refers to the process by which a model adjusts its parameters in response to training data to improve its predictions. In LLM, the model is exposed to examples and learns to make more accurate predictions based on the errors it makes (through methods such as gradient descent). This learning process usually occurs on powerful computing infrastructures.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8c302c elementor-widget elementor-widget-heading\" data-id=\"e8c302c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A concrete example<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2e3aaf elementor-widget elementor-widget-text-editor\" data-id=\"b2e3aaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Imagine a merger or acquisition project where a team has to produce a report that includes intellectual property, sensitive personal information and critical financial information.<\/p>\n<p>Today, the team can automate many tasks with the help of AI. For example, Copilot can automatically generate meeting transcripts, synthesize key points and integrate this information into the report directly. AI can also analyze complex datasets, provide relevant tables, and write summaries and recommendations based on the project\u2019s sensitive information and strategic objectives.<\/p>\n<p>When a user queries Copilot, the command is enriched with information regarding the user\u2019s context before questioning the model (LLM). This pre-processing process is called \u201cgrounding.\u201d It anchors model responses into organization-specific data. Before generating a response, the AI performs a contextual search in documents, emails, and other resources the user can access. This allows the AI to understand the question in a specific context and provide relevant responses based on internal company information rather than generic responses. This phase ensures results are linked to organizational realities. This phase allows you to invisibly inject company-specific information into the system prompt, which could be returned to the user later.<\/p>\n<p>After the AI generates an initial response, the \u201cpost-processing\u201d phase refines the output to make it clearer and more concise and format it according to the user\u2019s needs. Post-processing filters sensitive information (if properly configured) and adjusts tone and language to match professional style.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9039719 elementor-widget elementor-widget-heading\" data-id=\"9039719\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risks to manage<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad48c71 elementor-widget elementor-widget-text-editor\" data-id=\"ad48c71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security teams have increasing difficulty managing discretionary access, that is, access granted by an individual because they share a document or grant access to an MS-TEAMS team to a colleague or business partner. AI exacerbates this challenge by facilitating the creation, sharing, and access to information in a way that goes beyond traditional access management capabilities. The impact of accesses managed with laxity will be even greater because, in pre-processing, the AI can access all the information the user can access in their environment. However, the AI will be significantly more effective in finding documents relevant to the research context. This suggests that sensitive data exfiltration by malicious subjects will be even simpler to execute. Here is a table that lists other potentially problematic situations.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2ef88a e-con-full e-flex e-con e-child\" data-id=\"f2ef88a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3cb1f5a e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"3cb1f5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd31ade elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"fd31ade\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Description of the risk<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11cc80f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"11cc80f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Example of a mergers and acquisitions project with Copilot<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d9a5d2b e-con-full e-flex e-con e-child\" data-id=\"d9a5d2b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dfb3b95 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"dfb3b95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Prompt injection:<\/strong>\u00a0Manipulate AI through commands to generate harmful or inappropriate responses.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-293b49e elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"293b49e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A malicious employee could inject negative information into Copilot to influence responses, suggestions, etc.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f02f43e e-con-full e-flex e-con e-child\" data-id=\"f02f43e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4839b0f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4839b0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Insecure output handling:<\/strong>\u00a0The AI generates potentially risky results without validation.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f202bd2 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"f202bd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Copilot could generate a summary containing sensitive merger data, which is shared without prior human review.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68eab7c e-con-full e-flex e-con e-child\" data-id=\"68eab7c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1512915 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1512915\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Supply chain vulnerabilities:<\/strong>\u00a0Use of unsecured plugins or components.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ee5059 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"2ee5059\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A malicious plugin built into Microsoft 365 could access sensitive discussions about the acquisition project using Copilot.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c57b78b e-con-full e-flex e-con e-child\" data-id=\"c57b78b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a345bd3 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"a345bd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Sensitive information disclosure:<\/strong>\u00a0The AI reveals confidential data without adequate protection.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-028c311 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"028c311\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Copilot could accidentally reveal confidential acquisition details to an employee who does not have the necessary permissions but has been granted discretionary access.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-248c211 e-con-full e-flex e-con e-child\" data-id=\"248c211\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1feb137 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1feb137\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Excessive autonomy:<\/strong>\u00a0Giving the AI too much decision-making power.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f628fbd elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"f628fbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If Copilot is too autonomous, it may propose acquisition decisions that do not align with the leadership team\u2019s objectives.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8388cf7 elementor-widget elementor-widget-heading\" data-id=\"8388cf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The impact of cybersecurity legislation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-234c241 elementor-widget elementor-widget-text-editor\" data-id=\"234c241\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At the same time, recent legislation such as Law 25 in Quebec and Bills C-26 and C-27 in Canada impose strict data protection requirements. These laws reinforce the need to frame the management of unstructured information<\/p>\n<p>to comply with security standards and avoid severe penalties. Managing unstructured information is no longer just a good practice, it is a legal obligation that must be taken seriously by all business leaders. The ability of LLMs to use available information to provide a contextualized response significantly increases the risk of disclosure.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5e1e0c elementor-widget elementor-widget-heading\" data-id=\"c5e1e0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The urgency of action<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90db06e elementor-widget elementor-widget-text-editor\" data-id=\"90db06e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lax discretionary access management can be exploited on a large scale, particularly with the rise of AI agents such as Copilot. These AI tools can quickly identify and access documents available within the organization, increasing the risk of leaks of sensitive information. In this context, it becomes imperative to implement robust cybersecurity mechanisms to manage access and protect unstructured information.<\/p>\n<p>Access management should no longer be left to chance or handled ad hoc. On the contrary, it must be systematized, automated and integrated into a comprehensive cybersecurity strategy.<\/p>\n<h5 class=\"wp-block-heading\"><strong>Costly setbacks<\/strong><\/h5>\n<p>Decision-makers must capture the duality between AI\u2019s opportunity and the risks it creates. On the one hand, generative AI offers a unique opportunity to improve competitiveness by automating tasks, accelerating content creation and optimizing collaboration. On the other hand, this same technology increases vulnerabilities, particularly regarding the cybersecurity of unstructured information. Ignoring these risks can lead to costly financial and regulatory challenges. Therefore, it is crucial to manage access and protect sensitive data proactively and rigorously, while leveraging AI capabilities to remain competitive. Finding this balance between innovation and protection is key to ensuring long-term resilience.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity issues are becoming increasingly complex.<\/p>\n","protected":false},"author":2,"featured_media":6729,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[40],"tags":[],"ppma_author":[44],"class_list":["post-6740","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts"],"acf":{"hubspot":"","download_pdf":null},"yoast_head":"<title>AI in Collaborative Environments: a Double-Edged Sword - Mondata<\/title>\n<meta name=\"description\" content=\"Cybersecurity issues are becoming increasingly complex.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI in Collaborative Environments: a Double-Edged Sword - Mondata\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity issues are becoming increasingly complex.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/\" \/>\n<meta property=\"og:site_name\" content=\"Mondata\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-16T20:32:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Mondata\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kenny Paquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/\"},\"author\":{\"name\":\"Kenny Paquet\",\"@id\":\"https:\/\/mondata.ai\/en\/#\/schema\/person\/40b5748c4a72b18ce8ce4990cd8737e4\"},\"headline\":\"AI in Collaborative Environments: a Double-Edged Sword\",\"datePublished\":\"2024-09-09T16:00:00+00:00\",\"dateModified\":\"2026-03-16T20:32:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/mondata.ai\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp\",\"articleSection\":[\"Blog posts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/\",\"url\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/\",\"name\":\"AI in Collaborative Environments: a Double-Edged Sword - Mondata\",\"isPartOf\":{\"@id\":\"https:\/\/mondata.ai\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp\",\"datePublished\":\"2024-09-09T16:00:00+00:00\",\"dateModified\":\"2026-03-16T20:32:18+00:00\",\"description\":\"Cybersecurity issues are becoming increasingly complex.\",\"breadcrumb\":{\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#primaryimage\",\"url\":\"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp\",\"contentUrl\":\"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/mondata.ai\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI in Collaborative Environments: a Double-Edged Sword\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mondata.ai\/en\/#website\",\"url\":\"https:\/\/mondata.ai\/en\/\",\"name\":\"Mondata\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/mondata.ai\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mondata.ai\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mondata.ai\/en\/#organization\",\"name\":\"Mondata\",\"url\":\"https:\/\/mondata.ai\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mondata.ai\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mondata.ai\/wp-content\/uploads\/mondata_logo_white-2.svg\",\"contentUrl\":\"https:\/\/mondata.ai\/wp-content\/uploads\/mondata_logo_white-2.svg\",\"width\":163,\"height\":60,\"caption\":\"Mondata\"},\"image\":{\"@id\":\"https:\/\/mondata.ai\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mondata.ai\/en\/#\/schema\/person\/40b5748c4a72b18ce8ce4990cd8737e4\",\"name\":\"Kenny Paquet\"}]}<\/script>","yoast_head_json":{"title":"AI in Collaborative Environments: a Double-Edged Sword - Mondata","description":"Cybersecurity issues are becoming increasingly complex.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/","og_locale":"en_US","og_type":"article","og_title":"AI in Collaborative Environments: a Double-Edged Sword - Mondata","og_description":"Cybersecurity issues are becoming increasingly complex.","og_url":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/","og_site_name":"Mondata","article_published_time":"2024-09-09T16:00:00+00:00","article_modified_time":"2026-03-16T20:32:18+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp","type":"image\/webp"}],"author":"Mondata","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kenny Paquet","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#article","isPartOf":{"@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/"},"author":{"name":"Kenny Paquet","@id":"https:\/\/mondata.ai\/en\/#\/schema\/person\/40b5748c4a72b18ce8ce4990cd8737e4"},"headline":"AI in Collaborative Environments: a Double-Edged Sword","datePublished":"2024-09-09T16:00:00+00:00","dateModified":"2026-03-16T20:32:18+00:00","mainEntityOfPage":{"@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/mondata.ai\/en\/#organization"},"image":{"@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#primaryimage"},"thumbnailUrl":"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp","articleSection":["Blog posts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/","url":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/","name":"AI in Collaborative Environments: a Double-Edged Sword - Mondata","isPartOf":{"@id":"https:\/\/mondata.ai\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#primaryimage"},"image":{"@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#primaryimage"},"thumbnailUrl":"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp","datePublished":"2024-09-09T16:00:00+00:00","dateModified":"2026-03-16T20:32:18+00:00","description":"Cybersecurity issues are becoming increasingly complex.","breadcrumb":{"@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#primaryimage","url":"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp","contentUrl":"https:\/\/mondata.ai\/wp-content\/uploads\/ia-collaboration.webp","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/mondata.ai\/en\/ai-in-collaborative-environments-a-double-edged-sword\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/mondata.ai\/en\/"},{"@type":"ListItem","position":2,"name":"AI in Collaborative Environments: a Double-Edged Sword"}]},{"@type":"WebSite","@id":"https:\/\/mondata.ai\/en\/#website","url":"https:\/\/mondata.ai\/en\/","name":"Mondata","description":"","publisher":{"@id":"https:\/\/mondata.ai\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mondata.ai\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mondata.ai\/en\/#organization","name":"Mondata","url":"https:\/\/mondata.ai\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mondata.ai\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mondata.ai\/wp-content\/uploads\/mondata_logo_white-2.svg","contentUrl":"https:\/\/mondata.ai\/wp-content\/uploads\/mondata_logo_white-2.svg","width":163,"height":60,"caption":"Mondata"},"image":{"@id":"https:\/\/mondata.ai\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mondata.ai\/en\/#\/schema\/person\/40b5748c4a72b18ce8ce4990cd8737e4","name":"Kenny Paquet"}]}},"authors":[{"term_id":44,"user_id":0,"is_guest":1,"slug":"mondata","display_name":"Mondata","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":"","9":""}],"_links":{"self":[{"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/posts\/6740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/comments?post=6740"}],"version-history":[{"count":1,"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/posts\/6740\/revisions"}],"predecessor-version":[{"id":6741,"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/posts\/6740\/revisions\/6741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/media\/6729"}],"wp:attachment":[{"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/media?parent=6740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/categories?post=6740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/tags?post=6740"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/mondata.ai\/en\/wp-json\/wp\/v2\/ppma_author?post=6740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}