...
Probability of occurrence | Potential damage | Decision | Reasons | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Financial | 1 | GAFAM |
|
|
| Financially it is not possible to compete with GAFAM Mitigate→ find approach against GAFAM in strategic category | |||||||||||||||||
2 | Competing technology |
|
|
| |||||||||||||||||||
3 | Marketing |
|
|
| Mitigate→
| ||||||||||||||||||
4 | Funding |
|
|
| participating in projects and present ourself and requirements and capabilities | ||||||||||||||||||
5 | Environmental cost |
|
|
| not selecting environmental consuming technology like some types of ledgers | ||||||||||||||||||
Legal | 6 | Governments Rules |
|
|
|
| |||||||||||||||||
7 | International Compatibility (ex. GDPR) |
|
|
| same as above plus finding common denominator solutions | ||||||||||||||||||
8 | No definition or legal commitment for punishment in regard of misusingMisusing of DID |
|
|
| Refer to existing solution like revoking ID | ||||||||||||||||||
9 | User Responsibility | Strategic | 7 | Dependency | 8 | Intermediaries | 9 | Acceptance | 10 | Engagement (Governance Rules) | 11 | Usability | 12 | Interoperability (Standards and Protocols) | 13 | Integration | 14 | Communication (Marketing) | Security | 15 | Physical vulnerabilities (Device lost) | 16 |
- Consensus
|
|
|
| |||
Strategic | 10 | Dependency |
|
|
| |
11 | Intermediaries |
|
|
| Improvement in EUDI wallet | |
12 | Exposure to Governance Rules and standards |
|
|
| ||
13 | Usability |
|
|
| Existing system are still in place, and we improve the products and solutions continuously. | |
14 | Acceptance |
|
|
| Existing system are still in place, and we improve the products and solutions continuously. | |
15 | Interoperability (Standards and Protocols) |
|
|
| mitigate the risk with customization | |
16 | Integration |
|
|
| mitigate the risk with development | |
17 | ontopiness |
|
|
| come up with new services | |
Security | 18 | Protecting data |
|
|
| any security solution
|
19 | Losing data |
|
|
| improve recovery processes | |
20 | Dark Net |
|
|
| ||
21 | Trust Infrastructure |
|
|
|
- Consensus
many times in a year |
|
| User Responsibility |
| |||||||
once in 1 years | Funding |
| |||||||||
once in 2 years | Dark Net |
| ontopiness | ||||||||
once in 5 years | Trust Infrastructure | ||||||||||
once in 10 years | Environmental cost | ||||||||||
Occurrence | many times in a year | once in 1 years | once in 2 years | e.g. Physical vulnerabilities (Device lost) | once in 5 years | once in 10 years | percentage of occurrence Probability / Potential damage | Low | Medium | High | Very High |
- No-consensus-pile
.....