Potential damage
- Low
- Medium
- High
- Very high
Decisions:
- Accept: acknowledge the risk, but do not take any action before it hits
- Mitigate: take measures to reduce the probability of occurrence or the potential damage
- Avoid: do something else without this risk, e.g. nothing
- Transfer: let someone else take care of it, e.g. insurance
- (Deny the risk: not allowed to choose, but many managers do this nevertheless...)
| Probability of occurrence | Potential damage | Decision | Reasons | |||
|---|---|---|---|---|---|---|
Financial | 1 | GAFAM |
|
|
| Financially it is not possible to compete with GAFAM Mitigate→ find approach against GAFAM in strategic category |
| 2 | Competing technology |
|
|
| ||
| 3 | Marketing |
|
|
| Mitigate→
| |
| 4 | Funding |
|
|
| participating in projects and present ourself and requirements and capabilities | |
| 5 | Environmental cost |
|
|
| not selecting environmental consuming technology like some types of ledgers | |
| Legal | 6 | Governments Rules |
|
|
|
|
| 7 | International Compatibility (ex. GDPR) |
|
|
| same as above plus finding common denominator solutions | |
| 8 | Misusing of DID |
|
|
| Refer to existing solution like revoking ID | |
| Strategic | 7 | Dependency |
|
|
| |
| 8 | Intermediaries |
|
|
| Improvement in EUDI wallet | |
| 9 | Exposure to Governance Rules and standards |
|
|
| ||
| 10 | Usability |
|
|
| Existing system are still in place, and we improve the products and solutions continuously. | |
| 11 | Acceptance |
|
|
| Existing system are still in place, and we improve the products and solutions continuously. | |
| 12 | Interoperability (Standards and Protocols) |
|
|
| mitigate the risk with customization | |
| 13 | Integration |
|
|
| mitigate the risk with development | |
| 14 | ontopiness |
|
|
| come up with new services | |
| Security | 15 | Losing our data |
|
|
| |
| 16 | Protecting sensitive data |
|
|
| ||
| 17 | Security of Credentials |
|
|
| ||
| 18 | High value target |
|
|
|
- Consensus
| many times in a year | Competing technology Exposure to Governance Rules and standards | Misusing of DID Dependency Usability Acceptance | GAFAM | |
| once in 1 years | Funding | Marketing Intermediaries | ||
| once in 2 years |
| ontopiness | ||
| once in 5 years | ||||
once in 10 years | Environmental cost | |||
| Occurrence Probability / Potential damage | Low | Medium | High | Very High |
- No-consensus-pile
.....