Homework for all T7 experts
- please "claim" a row in both tables below by replacing "xx" with your initials
- fill in your assessment regarding probability and damage of the risks as per the risk assessment page up one level
- find the categorisation and code copied below:
Probability of occurrence | Potential damage |
---|---|
1 == once in 10 years 2 == once in 5 years 3 == once in 2 years 4 ==once in 1 years 5 ==many times in a year | 1 == Low 2 == Medium 3 == High 4 == Very high |
The "probability" table
Risk # | Risk name | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. |
[1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | ||
Expert | |||||||||||
Group | AA | ||||||||||
ER | |||||||||||
CG | |||||||||||
NL | xx | xx | xx | xx | xx | ||||||
1 | Fin GAFAM | 5 | 5 | 5 | 4 | 4 | |||||
2 | Fin Technology | 5 | 5 | 5 | 5 | 5 | |||||
3 | Fin Marketing | 4 | 5 | 5 | 4 | 5 | |||||
4 | Fin Environmental Cost | 1 | 1 | 2 | 2 | 1 | |||||
5 | Fin Funding | 4 | 3 | 3 | 3 | 3 | |||||
6 | Legal Governments | 3 | 2 | 3 | 3 | 3 | |||||
7 | Legal Compatibility | 3 | 3 | 3 | 3 | 4 | |||||
8 | Legal DID misuse | 5 | 5 | 5 | 5 | 5 | |||||
9 | Legal User responsibility | 5 | 5 | 5 | 5 | 5 | |||||
10 | Strategy Dependency | 5 | 5 | 5 | 4 | 5 | |||||
11 | Strategy Intermediaries | 4 | 4 | 4 | 3 | 4 | |||||
12 | Strategy Exposure | 5 | 5 | 5 | 3 | 5 | |||||
13 | Strategy Usability | 5 | 5 | 5 | 5 | 5 | |||||
14 | Strategy Acceptance | 5 | 5 | 5 | 5 | 5 | |||||
15 | Strategy Interoperability | 3 | 3 | 3 | 3 | 4 | |||||
16 | Strategy Integration | 3 | 3 | 3 | 4 | 4 | |||||
17 | Strategy Ontopiness | 3 | 3 | 3 | 4 | 4 | |||||
18 | Security Protecting data | 5 | 5 | 5 | 5 | 5 | |||||
19 | Security Loss of Data | 5 | 5 | 5 | 5 | 5 | |||||
20 | Security Darknet | 3 | 3 | 3 | 3 | 4 | |||||
21 | Security Trust Infrastructure | 2 | 2 | 2 | 2 | 3 |
The "damage" table
Risk # | Risk name | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. |
[1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | ||
Expert | |||||||||||
Group | AA | ||||||||||
ER | |||||||||||
CG | |||||||||||
NL | xx | xx | xx | xx | xx | ||||||
1 | Fin GAFAM | 4 | 4 | 4 | 4 | 4 | |||||
2 | Fin Technology | 1 | 2 | 2 | 2 | 2 | |||||
3 | Fin Marketing | 3 | 4 | 4 | 3 | 4 | |||||
4 | Fin Environmental Cost | 1 | 1 | 1 | 1 | 1 | |||||
5 | Fin Funding | 2 | 3 | 3 | 2 | 3 | |||||
6 | Legal Governments | 3 | 4 | 4 | 3 | 4 | |||||
7 | Legal Compatibility | 3 | 3 | 3 | 3 | 3 | |||||
8 | Legal DID misuse | 2 | 3 | 3 | 1 | 3 | |||||
9 | Legal User responsibility | 3 | 3 | 3 | 3 | 2 | |||||
10 | Strategy Dependency | 2 | 2 | 2 | 2 | 3 | |||||
11 | Strategy Intermediaries | 3 | 3 | 3 | 3 | 3 | |||||
12 | Strategy Exposure | 1 | 4 | 4 | 2 | 4 | |||||
13 | Strategy Usability | 2 | 3 | 3 | 3 | 4 | |||||
14 | Strategy Acceptance | 2 | 2 | 2 | 2 | 3 | |||||
15 | Strategy Interoperability | 3 | 3 | 3 | 2 | 3 | |||||
16 | Strategy Integration | 3 | 3 | 3 | 2 | 3 | |||||
17 | Strategy Ontopiness | 4 | 4 | 4 | 3 | 3 | |||||
18 | Security Protecting data | 2 | 3 | 3 | 2 | 3 | |||||
19 | Security Loss of Data | 4 | 4 | 4 | 3 | 2 | |||||
20 | Security Darknet | 1 | 1 | 1 | 2 | 1 | |||||
21 | Security Trust Infrastructure | 4 | 4 | 4 | 4 | 4 |
FYI: this is the spreadsheet where all your input will be copied and visualised:
View file | ||||
---|---|---|---|---|
|