You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
Version 1
Next »
Homework for all T7 experts
- please "claim" a row in both tables below by replacing "xx" with your initials
- fill in your assessment regarding probability and damage of the risks as per the risk assessment page up one level
- for simplicity reasons, find the categorisation copied below:
The "probability" table
| Risk # | Risk name | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. |
|
| [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] |
| Expert | CG | AA | xx | xx | xx | xx | xx | xx | xx | xx |
| 1 | Fin GAFAM | 5 | 5 |
|
|
|
|
|
|
|
|
| 2 | Fin Technology | 5 | 5 |
|
|
|
|
|
|
|
|
| 3 | Fin Marketing | 4 | 5 |
|
|
|
|
|
|
|
|
| 4 | Fin Environmental Cost | 1 | 1 |
|
|
|
|
|
|
|
|
| 5 | Fin Funding | 4 | 3 |
|
|
|
|
|
|
|
|
| 6 | Legal Governments | 3 | 2 |
|
|
|
|
|
|
|
|
| 7 | Legal Compatibility | 3 | 3 |
|
|
|
|
|
|
|
|
| 8 | Legal DID misuse | 5 | 5 |
|
|
|
|
|
|
|
|
| 9 | Legal User responsibility | 5 | 5 |
|
|
|
|
|
|
|
|
| 10 | Strategy Dependency | 5 | 5 |
|
|
|
|
|
|
|
|
| 11 | Strategy Intermediaries | 4 | 4 |
|
|
|
|
|
|
|
|
| 12 | Strategy Exposure | 5 | 5 |
|
|
|
|
|
|
|
|
| 13 | Strategy Usability | 5 | 5 |
|
|
|
|
|
|
|
|
| 14 | Strategy Acceptance | 5 | 5 |
|
|
|
|
|
|
|
|
| 15 | Strategy Interoperability | 3 | 3 |
|
|
|
|
|
|
|
|
| 16 | Strategy Integration | 3 | 3 |
|
|
|
|
|
|
|
|
| 17 | Strategy Ontopiness | 3 | 3 |
|
|
|
|
|
|
|
|
| 18 | Security Protecting data | 5 | 5 |
|
|
|
|
|
|
|
|
| 19 | Security Loss of Data | 5 | 5 |
|
|
|
|
|
|
|
|
| 20 | Security Darknet | 3 | 3 |
|
|
|
|
|
|
|
|
| 21 | Security Trust Infrastructure | 2 | 2 |
|
|
|
|
|
|
|
|
The "damage" table
| Risk # | Risk name | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. |
|
| [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] |
| Expert | CG | AA | xx | xx | xx | xx | xx | xx | xx | xx |
| 1 | Fin GAFAM | 4 | 4 |
|
|
|
|
|
|
|
|
| 2 | Fin Technology | 1 | 2 |
|
|
|
|
|
|
|
|
| 3 | Fin Marketing | 3 | 4 |
|
|
|
|
|
|
|
|
| 4 | Fin Environmental Cost | 1 | 1 |
|
|
|
|
|
|
|
|
| 5 | Fin Funding | 2 | 3 |
|
|
|
|
|
|
|
|
| 6 | Legal Governments | 3 | 4 |
|
|
|
|
|
|
|
|
| 7 | Legal Compatibility | 3 | 3 |
|
|
|
|
|
|
|
|
| 8 | Legal DID misuse | 2 | 3 |
|
|
|
|
|
|
|
|
| 9 | Legal User responsibility | 3 | 3 |
|
|
|
|
|
|
|
|
| 10 | Strategy Dependency | 2 | 2 |
|
|
|
|
|
|
|
|
| 11 | Strategy Intermediaries | 3 | 3 |
|
|
|
|
|
|
|
|
| 12 | Strategy Exposure | 1 | 4 |
|
|
|
|
|
|
|
|
| 13 | Strategy Usability | 2 | 3 |
|
|
|
|
|
|
|
|
| 14 | Strategy Acceptance | 2 | 2 |
|
|
|
|
|
|
|
|
| 15 | Strategy Interoperability | 3 | 3 |
|
|
|
|
|
|
|
|
| 16 | Strategy Integration | 3 | 3 |
|
|
|
|
|
|
|
|
| 17 | Strategy Ontopiness | 4 | 4 |
|
|
|
|
|
|
|
|
| 18 | Security Protecting data | 2 | 3 |
|
|
|
|
|
|
|
|
| 19 | Security Loss of Data | 4 | 4 |
|
|
|
|
|
|
|
|
| 20 | Security Darknet | 1 | 1 |
|
|
|
|
|
|
|
|
| 21 | Security Trust Infrastructure | 4 | 4 |
|
|
|
|
|
|
|
|