Potential damage
- Low
- Medium
- High
- Very high
Decisions:
- Accept: acknowledge the risk, but do not take any action before it hits
- Mitigate: take measures to reduce the probability of occurrence or the potential damage
- Avoid: do something else without this risk, e.g. nothing
- Transfer: let someone else take care of it, e.g. insurance
- (Deny the risk: not allowed to choose, but many managers do this nevertheless...)
|
|
|
Probability of occurrence | Potential damage | Decision | Reasons |
---|---|---|---|---|---|---|
Financial |
1 |
GAFAM |
|
|
|
Financially it is not possible to compete with GAFAM Mitigate→ find approach against GAFAM in strategic category |
2 |
Competing technology |
|
|
|
|
|
3 |
Marketing |
|
|
|
Mitigate→
|
|
4 |
Funding |
|
|
|
participating in projects and present ourself and requirements and capabilities | |
5 |
Environmental cost |
|
|
|
not selecting environmental consuming technology like some types of ledgers | |
Legal | 6 |
Governments Rules |
|
|
|
|
7 |
International Compatibility (ex. GDPR) |
|
|
|
same as above plus finding common denominator solutions
|
|
|
8 |
Misusing of DID |
|
|
|
Refer to existing solution like revoking ID |
|
9 |
User Responsibility |
|
|
|
|
Strategic | 10 |
Dependency |
|
|
|
|
11 |
Intermediaries |
|
|
|
Improvement in EUDI wallet | |
12 |
Exposure to Governance Rules and standards |
|
|
|
|
|
13 |
Usability
|
|
|
|
Existing system are still in place, and we improve the products and solutions continuously. | |
14 | Acceptance |
|
|
|
Existing system are still in place, and we improve the products and solutions continuously. | |
15 |
Interoperability (Standards and Protocols) |
|
|
|
mitigate the risk with customization | |
16 |
Integration |
|
|
|
mitigate the risk with development | |
17 |
ontopiness
|
|
|
|
come up with new services | |
Security
|
18 |
Protecting data
|
|
|
|
any security solution
|
19 |
Losing data
|
|
|
|
improve recovery processes
|
|
20 |
Dark Net |
|
|
|
|
|
21 |
Trust Infrastructure |
|
|
|
|
- Consensus
many times in a year |
|
|
User Responsibility |
|
once in 1 years |
|
Funding |
|
|
once in 2 years | Dark Net |
|
|
ontopiness |
once in 5 years |
|
|
|
Trust Infrastructure |
once in 10 years |
Environmental cost |
|
|
|
Occurrence Probability / Potential damage | Low | Medium | High | Very High |
- No-consensus-pile
.....