Risk concepts extend the [[[DPV]]] risk vocabulary to provide additional vocabularies specific to risk management, assessment, controls, and consequences.

The namespace for terms in risk is https://www.w3id.org/dpv/risk#
The suggested prefix for the namespace is risk
The risk vocabulary and its documentation is available on GitHub.

DPV v1.0 - beta The current release is a beta/test version intended to be published as a v1. Feedback can be provided via GitHub or [email protected] (mailing list).

DPV Family of Documents

Related Links

This document is published by the Data Privacy Vocabularies and Controls Community Group (DPVCG) as a deliverable and report of its work in creating and maintaining the Data Privacy Vocabulary (DPV).

Contributing to the DPV and its extensions The DPVCG welcomes participation regarding the DPV, including expansion or refinement of its terms, addressing open issues, and welcomes suggestions on their resolution or mitigation.

For contributions to the DPV, please see the section on GitHub. The current list of open issues and their discussions to date can be found at GitHub issues.

Introduction

Risk, Likelihood, Severity Levels

Classes

3 Likelihood Levels | 3 Risk Levels | 3 Severity Levels | 5 Likelihood Levels | 5 Risk Levels | 5 Severity Levels | 7 Likelihood Levels | 7 Risk Levels | 7 Severity Levels | Extremely High Likelihood | Extremely High Risk | Extremely High Severity | Extremely Low Likelihood | Extremely Low Risk | Extremely Low Severity | High Likelihood | High Risk | High Severity | Low Likelihood | Low Risk | Low Severity | Moderate Likelihood | Moderate Risk | Moderate Severity | Very High Likelihood | Very High Risk | Very High Severity | Very Low Likelihood | Very Low Risk | Very Low Severity |

3 Likelihood Levels

IRI https://w3id.org/dpv/risk#3LikelihoodLevels
Term: 3LikelihoodLevels
Label: 3 Likelihood Levels
Description: Scale with 3 Likelihood Levels from High to Low
SubType of: dpv:Likelihood
Created:
Contributor(s): Harshvardhan J. Pandit

3 Risk Levels

IRI https://w3id.org/dpv/risk#3RiskLevels
Term: 3RiskLevels
Label: 3 Risk Levels
Description: Scale with 3 Risk Levels from High to Low
SubType of: dpv:RiskLevel
Created:
Contributor(s): Harshvardhan J. Pandit

3 Severity Levels

IRI https://w3id.org/dpv/risk#3SeverityLevels
Term: 3SeverityLevels
Label: 3 Severity Levels
Description: Scale with 3 Severity Levels from High to Low
SubType of: dpv:Severity
Created:
Contributor(s): Harshvardhan J. Pandit

5 Likelihood Levels

IRI https://w3id.org/dpv/risk#5LikelihoodLevels
Term: 5LikelihoodLevels
Label: 5 Likelihood Levels
Description: Scale with 5 Likelihood Levels from Very High to Very Low
SubType of: dpv:Likelihood
Created:
Contributor(s): Harshvardhan J. Pandit

5 Risk Levels

IRI https://w3id.org/dpv/risk#5RiskLevels
Term: 5RiskLevels
Label: 5 Risk Levels
Description: Scale with 5 Risk Levels from Very High to Very Low
SubType of: dpv:RiskLevel
Created:
Contributor(s): Harshvardhan J. Pandit

5 Severity Levels

IRI https://w3id.org/dpv/risk#5SeverityLevels
Term: 5SeverityLevels
Label: 5 Severity Levels
Description: Scale with 5 Severity Levels from Very High to Very Low
SubType of: dpv:Severity
Created:
Contributor(s): Harshvardhan J. Pandit

7 Likelihood Levels

IRI https://w3id.org/dpv/risk#7LikelihoodLevels
Term: 7LikelihoodLevels
Label: 7 Likelihood Levels
Description: Scale with 7 Likelihood Levels from Extremely High to Extremely Low
SubType of: dpv:Likelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7 Risk Levels

IRI https://w3id.org/dpv/risk#7RiskLevels
Term: 7RiskLevels
Label: 7 Risk Levels
Description: Scale with 7 Risk Levels from Extremely High to Extremely Low
SubType of: dpv:RiskLevel
Created:
Contributor(s): Harshvardhan J. Pandit

7 Severity Levels

IRI https://w3id.org/dpv/risk#7SeverityLevels
Term: 7SeverityLevels
Label: 7 Severity Levels
Description: Scale with 7 Severity Levels from Extremely High to Extremely Low
SubType of: dpv:Severity
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Likelihood

IRI https://w3id.org/dpv/risk#ExtremelyHighLikelihood
Term: ExtremelyHighLikelihood
Label: Extremely High Likelihood
Description: Level where Likelihood is Extremely High
Instance of: dpv:Likelihood, risk:7LikelihoodLevels
rdf:value 0.99
Note: The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Risk

IRI https://w3id.org/dpv/risk#ExtremelyHighRisk
Term: ExtremelyHighRisk
Label: Extremely High Risk
Description: Level where Risk is Extremely High
Instance of: dpv:RiskLevel, risk:7RiskLevels
rdf:value 0.99
Note: The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Severity

IRI https://w3id.org/dpv/risk#ExtremelyHighSeverity
Term: ExtremelyHighSeverity
Label: Extremely High Severity
Description: Level where Severity is Extremely High
Instance of: dpv:Severity, risk:7SeverityLevels
rdf:value 0.99
Note: The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Likelihood

IRI https://w3id.org/dpv/risk#ExtremelyLowLikelihood
Term: ExtremelyLowLikelihood
Label: Extremely Low Likelihood
Description: Level where Likelihood is Extremely Low
Instance of: dpv:Likelihood, risk:7LikelihoodLevels
rdf:value 0.01
Note: The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Risk

IRI https://w3id.org/dpv/risk#ExtremelyLowRisk
Term: ExtremelyLowRisk
Label: Extremely Low Risk
Description: Level where Risk is Extremely Low
Instance of: dpv:RiskLevel, risk:7RiskLevels
rdf:value 0.01
Note: The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Severity

IRI https://w3id.org/dpv/risk#ExtremelyLowSeverity
Term: ExtremelyLowSeverity
Label: Extremely Low Severity
Description: Level where Severity is Extremely Low
Instance of: dpv:Severity, risk:7SeverityLevels
rdf:value 0.01
Note: The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

High Likelihood

IRI https://w3id.org/dpv/risk#HighLikelihood
Term: HighLikelihood
Label: High Likelihood
Description: Level where Likelihood is High
Instance of: dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.75
Note: The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk

IRI https://w3id.org/dpv/risk#HighRisk
Term: HighRisk
Label: High Risk
Description: Level where Risk is High
Instance of: dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.75
Note: The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

High Severity

IRI https://w3id.org/dpv/risk#HighSeverity
Term: HighSeverity
Label: High Severity
Description: Level where Severity is High
Instance of: dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.75
Note: The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Low Likelihood

IRI https://w3id.org/dpv/risk#LowLikelihood
Term: LowLikelihood
Label: Low Likelihood
Description: Level where Likelihood is Low
Instance of: dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.25
Note: The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk

IRI https://w3id.org/dpv/risk#LowRisk
Term: LowRisk
Label: Low Risk
Description: Level where Risk is Low
Instance of: dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.25
Note: The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Low Severity

IRI https://w3id.org/dpv/risk#LowSeverity
Term: LowSeverity
Label: Low Severity
Description: Level where Severity is Low
Instance of: dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.25
Note: The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Likelihood

IRI https://w3id.org/dpv/risk#ModerateLikelihood
Term: ModerateLikelihood
Label: Moderate Likelihood
Description: Level where Likelihood is Moderate
Instance of: dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.5
Note: The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk

IRI https://w3id.org/dpv/risk#ModerateRisk
Term: ModerateRisk
Label: Moderate Risk
Description: Level where Risk is Moderate
Instance of: dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.5
Note: The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Severity

IRI https://w3id.org/dpv/risk#ModerateSeverity
Term: ModerateSeverity
Label: Moderate Severity
Description: Level where Severity is Moderate
Instance of: dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.5
Note: The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Likelihood

IRI https://w3id.org/dpv/risk#VeryHighLikelihood
Term: VeryHighLikelihood
Label: Very High Likelihood
Description: Level where Likelihood is Very High
Instance of: dpv:Likelihood, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.9
Note: The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk

IRI https://w3id.org/dpv/risk#VeryHighRisk
Term: VeryHighRisk
Label: Very High Risk
Description: Level where Risk is Very High
Instance of: dpv:RiskLevel, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.9
Note: The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Severity

IRI https://w3id.org/dpv/risk#VeryHighSeverity
Term: VeryHighSeverity
Label: Very High Severity
Description: Level where Severity is Very High
Instance of: dpv:Severity, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.9
Note: The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Likelihood

IRI https://w3id.org/dpv/risk#VeryLowLikelihood
Term: VeryLowLikelihood
Label: Very Low Likelihood
Description: Level where Likelihood is Very Low
Instance of: dpv:Likelihood, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.1
Note: The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk

IRI https://w3id.org/dpv/risk#VeryLowRisk
Term: VeryLowRisk
Label: Very Low Risk
Description: Level where Risk is Very Low
Instance of: dpv:RiskLevel, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.1
Note: The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Severity

IRI https://w3id.org/dpv/risk#VeryLowSeverity
Term: VeryLowSeverity
Label: Very Low Severity
Description: Level where Severity is Very Low
Instance of: dpv:Severity, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.1
Note: The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Controls

Classes

Avoid Source | Change Consequence | Change Impact | Control Consequence | Control Monitors | Control Risk Source | Halt Source | Monitor Consequence | Monitor Impact | Monitor Risk | Monitor Risk Control | Monitor Risk Source | Monitor Vulnerabilities | Reduce Likelihood | Reduce Severity | Remove Consequence | Remove Impact | Remove Source | Share Risk |

Avoid Source

IRI https://w3id.org/dpv/risk#AvoidSource
Term: AvoidSource
Label: Avoid Source
Description: Risk Control that avoids the risk source
SubType of: risk:ControlRiskSource
Created:
Contributor(s): Harshvardhan J. Pandit

Change Consequence

IRI https://w3id.org/dpv/risk#ChangeConsequence
Term: ChangeConsequence
Label: Change Consequence
Description: Risk Control that changes Consequence
SubType of: risk:ControlConsequence
Created:
Contributor(s): Harshvardhan J. Pandit

Change Impact

IRI https://w3id.org/dpv/risk#ChangeImpact
Term: ChangeImpact
Label: Change Impact
Description: Risk Control that changes Impact
SubType of: risk:ControlConsequence
Created:
Contributor(s): Harshvardhan J. Pandit

Control Consequence

IRI https://w3id.org/dpv/risk#ControlConsequence
Term: ControlConsequence
Label: Control Consequence
Description: Risk Mitigation Measure that controls the Consequences and Impacts
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

Control Monitors

IRI https://w3id.org/dpv/risk#ControlMonitors
Term: ControlMonitors
Label: Control Monitors
Description: Risk Mitigation Measure that uses controls to monitor events
SubType of: dpv:RiskMitigationMeasure
Note: Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Created:
Contributor(s): Harshvardhan J. Pandit

Control Risk Source

IRI https://w3id.org/dpv/risk#ControlRiskSource
Term: ControlRiskSource
Label: Control Risk Source
Description: Risk Mitigation Measure that controls the Risk Source
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

Halt Source

IRI https://w3id.org/dpv/risk#HaltSource
Term: HaltSource
Label: Halt Source
Description: Risk Control that halts the risk source or prevents it from materialising
SubType of: risk:ControlRiskSource
Created:
Contributor(s): Harshvardhan J. Pandit

Monitor Consequence

IRI https://w3id.org/dpv/risk#MonitorConsequence
Term: MonitorConsequence
Label: Monitor Consequence
Description: Risk Control that monitors a Risk Consequence
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

Monitor Impact

IRI https://w3id.org/dpv/risk#MonitorImpact
Term: MonitorImpact
Label: Monitor Impact
Description: Risk Control that monitors a Risk Impact
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

Monitor Risk

IRI https://w3id.org/dpv/risk#MonitorRisk
Term: MonitorRisk
Label: Monitor Risk
Description: Risk Control that monitors a Risk
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

Monitor Risk Control

IRI https://w3id.org/dpv/risk#MonitorRiskControl
Term: MonitorRiskControl
Label: Monitor Risk Control
Description: Risk Control that monitors another Risk Control
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

Monitor Risk Source

IRI https://w3id.org/dpv/risk#MonitorRiskSource
Term: MonitorRiskSource
Label: Monitor Risk Source
Description: Risk Control that monitors a Risk Source
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

Monitor Vulnerabilities

IRI https://w3id.org/dpv/risk#MonitorVulnerabilities
Term: MonitorVulnerabilities
Label: Monitor Vulnerabilities
Description: Risk Control that monitors a Risk Vulnerability
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

Reduce Likelihood

IRI https://w3id.org/dpv/risk#ReduceLikelihood
Term: ReduceLikelihood
Label: Reduce Likelihood
Description: Risk Control that reduces the likelihood of an event
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

Reduce Severity

IRI https://w3id.org/dpv/risk#ReduceSeverity
Term: ReduceSeverity
Label: Reduce Severity
Description: Risk Control that reduces the severity of an event
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

Remove Consequence

IRI https://w3id.org/dpv/risk#RemoveConsequence
Term: RemoveConsequence
Label: Remove Consequence
Description: Risk Control that removes Consequence i.e. prevents it from materialising
SubType of: risk:ControlConsequence
Created:
Contributor(s): Harshvardhan J. Pandit

Remove Impact

IRI https://w3id.org/dpv/risk#RemoveImpact
Term: RemoveImpact
Label: Remove Impact
Description: Risk Control that removes Impact i.e. prevents it from materialising
SubType of: risk:ControlConsequence
Created:
Contributor(s): Harshvardhan J. Pandit

Remove Source

IRI https://w3id.org/dpv/risk#RemoveSource
Term: RemoveSource
Label: Remove Source
Description: Risk Control that removes the risk source
SubType of: risk:ControlRiskSource
Created:
Contributor(s): Harshvardhan J. Pandit

Share Risk

IRI https://w3id.org/dpv/risk#ShareRisk
Term: ShareRisk
Label: Share Risk
Description: Risk Mitigation Measure that shares Risk e.g. amongst stakeholders
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

Consequences and Impacts

Classes

Abusive Content Utilisation | Attack on Private Life | Authorisation Failure | Blackmail | Brute Force Authorisations | Business disruption | Business impact | Business Performance Impairment | Child Violence | Citizens impact | Coercion | Compliance impact | Compromise Account | Compromise Account Credentials | Compromise Account Security | Confidentiality Breach | Consequence for Data Subject | Consequence on Data Security | Copyright Violation | Corruption of Data | Cost of Acquisition | Cost of Backup | Cost of Configuration | Cost of Installation | Cost of Judicial Penalties | Cost of Judicial Proceedings | Cost of Operation Interruption | Cost of Suspended Operations | Cryptojacking | Cyber Spying | Cyber Stalking | Damage by Third Party | Danger to Customers | Danger to Personnel | Data Breach | Denial of Service Attack (DoS) | Detriment to Recovery | Discrimination | Distributed Denial of Service Attack (DDoS) | Eavesdropping | Economic Disadvantage | Environmental Safety Endangerment | Equipment Failure | Equipment Malfunction | Errornous System Use | Extorsion | Financial Equipment Costs | Financial Investigation Costs | Financial Loss | Financial Personnel Costs | Financial Repair Costs | Fraud | Government Crisis | Harmful Spech | Health and life impact | Human Errors | Identity Dispute | Identity Fraud | Identity Theft | Illegal Processing of Data | Impact on Data Subject | Impact to Rights | Increase Internal Cost | Industrial Crisis | Injury | Interception of Communications | Internal Operation Disruption | Known Vulnerability Exploited | Law Enforcement Adverse Effects | Limitation of Rights | Loss of Assets | Loss of Competitive Advantage | Loss of Control over Data | Loss of Credibility | Loss of Customer Confidence | Loss of Customers | Loss of Data | Loss of Funds | Loss of Goods | Loss of Goodwill | Loss of Negotiating Capacity | Loss of Opportunity | Loss of Proprietary Information | Loss of Reputation | Loss of Resources | Loss of Suppliers | Loss of Technological Advantage | Loss of Trust | Malicious Code Attack | Malware Attack | MisinformationDisinformation | Misuse of Breached Information | Organisation Disruption | Personal Safety Endangerment | Personnel Absence | Phishing Scam | Physical Assault | Physical Spying | Physical Stalking | Prevent Exercising of Rights | Privacy impact | Psychological Harm | Public Order Breach | RansomwareAttack | Remote Spying | Replacement Costs | Reputation and trust impact | Retrieval of Deleted Data | Retrieval of Discarded Equipment | Sabotage | Scam | Security Breach | Service Interruption | Sexual Violence | Social Disadvantage | Spam | Spoofing | Spying | Stalking | System Failure | System Intrusion | System Malfunction | Terrorism | Theft | Theft of Equipment | Theft of Media | Third Party Operation Disruption | Unauthorised Access to Premises | Unauthorised Code Access | Unauthorised Code Disclosure | Unauthorised Code Modification | Unauthorised Data Access | Unauthorised Data Disclosure | Unauthorised Data Modification | Unauthorised Impersonation | Unauthorised Information Disclosure | Unauthorised Re-Identification | Unauthorised Resource Use | Unauthorised System Access | Unauthorised System Modification | Unknown Vulnerability Exploited | Unwanted Code Deletion | Unwanted Data Deletion | Unwanted Disclosure of Data | Vandalism | Violation of Code of Conduct | Violation of Contractual Obligations | Violation of Ethical Code | Violation of Rights | Violation of Regulatory Obligations | Violation of Statutory Obligations | Vulnerability Created | Vulnerability Exploited |

Abusive Content Utilisation

IRI https://w3id.org/dpv/risk#AbusiveContentUtilisation
Term: AbusiveContentUtilisation
Label: Abusive Content Utilisation
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Attack on Private Life

IRI https://w3id.org/dpv/risk#AttackonPrivateLife
Term: AttackonPrivateLife
Label: Attack on Private Life
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Authorisation Failure

IRI https://w3id.org/dpv/risk#AuthorisationFailure
Term: AuthorisationFailure
Label: Authorisation Failure
Description:
SubType of: dpv:Detriment
Source: ENISa Trust Services Security Incidents 2021
Created:
Contributor(s): Harshvardhan J. Pandit

Blackmail

IRI https://w3id.org/dpv/risk#Blackmail
Term: Blackmail
Label: Blackmail
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Brute Force Authorisations

IRI https://w3id.org/dpv/risk#BruteForceAuthorisations
Term: BruteForceAuthorisations
Label: Brute Force Authorisations
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Business disruption

IRI https://w3id.org/dpv/risk#Businessdisruption
Term: Businessdisruption
Label: Business disruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Business impact

IRI https://w3id.org/dpv/risk#BusinessImpact
Term: BusinessImpact
Label: Business impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Business Performance Impairment

IRI https://w3id.org/dpv/risk#BusinessPerformanceImpairment
Term: BusinessPerformanceImpairment
Label: Business Performance Impairment
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Child Violence

IRI https://w3id.org/dpv/risk#ChildViolence
Term: ChildViolence
Label: Child Violence
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Citizens impact

IRI https://w3id.org/dpv/risk#CitizensImpact
Term: CitizensImpact
Label: Citizens impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Coercion

IRI https://w3id.org/dpv/risk#Coercion
Term: Coercion
Label: Coercion
Description:
SubType of: dpv:Harm
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Compliance impact

IRI https://w3id.org/dpv/risk#ComplianceImpact
Term: ComplianceImpact
Label: Compliance impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Compromise Account

IRI https://w3id.org/dpv/risk#CompromiseAccount
Term: CompromiseAccount
Label: Compromise Account
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Compromise Account Credentials

IRI https://w3id.org/dpv/risk#CompromiseAccountCredentials
Term: CompromiseAccountCredentials
Label: Compromise Account Credentials
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Compromise Account Security

IRI https://w3id.org/dpv/risk#CompromiseAccountSecurity
Term: CompromiseAccountSecurity
Label: Compromise Account Security
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Confidentiality Breach

IRI https://w3id.org/dpv/risk#ConfidentialityBreach
Term: ConfidentialityBreach
Label: Confidentiality Breach
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Consequence for Data Subject

IRI https://w3id.org/dpv/risk#ConsequenceForDataSubject
Term: ConsequenceForDataSubject
Label: Consequence for Data Subject
Description:
SubType of: dpv:Consequence
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

Consequence on Data Security

IRI https://w3id.org/dpv/risk#ConsequenceOnDataSecurity
Term: ConsequenceOnDataSecurity
Label: Consequence on Data Security
Description:
SubType of: dpv:Consequence
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

Copyright Violation

IRI https://w3id.org/dpv/risk#CopyrightViolation
Term: CopyrightViolation
Label: Copyright Violation
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Corruption of Data

IRI https://w3id.org/dpv/risk#CorruptionData
Term: CorruptionData
Label: Corruption of Data
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cost of Acquisition

IRI https://w3id.org/dpv/risk#CostAcquisition
Term: CostAcquisition
Label: Cost of Acquisition
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cost of Backup

IRI https://w3id.org/dpv/risk#CostBackup
Term: CostBackup
Label: Cost of Backup
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cost of Configuration

IRI https://w3id.org/dpv/risk#CostConfiguration
Term: CostConfiguration
Label: Cost of Configuration
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cost of Installation

IRI https://w3id.org/dpv/risk#CostInstallation
Term: CostInstallation
Label: Cost of Installation
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cost of Judicial Penalties

IRI https://w3id.org/dpv/risk#CostJudicialPenalties
Term: CostJudicialPenalties
Label: Cost of Judicial Penalties
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cost of Judicial Proceedings

IRI https://w3id.org/dpv/risk#CostJudicialProceedings
Term: CostJudicialProceedings
Label: Cost of Judicial Proceedings
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cost of Operation Interruption

IRI https://w3id.org/dpv/risk#CostOperationInterruption
Term: CostOperationInterruption
Label: Cost of Operation Interruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cost of Suspended Operations

IRI https://w3id.org/dpv/risk#CostSuspendedOperations
Term: CostSuspendedOperations
Label: Cost of Suspended Operations
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cryptojacking

IRI https://w3id.org/dpv/risk#Cryptojacking
Term: Cryptojacking
Label: Cryptojacking
Description: Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency
SubType of: dpv:Detriment
Source: ENISA Threat Landscape 2021
Created:
Contributor(s): Harshvardhan J. Pandit

Cyber Spying

IRI https://w3id.org/dpv/risk#CyberSpying
Term: CyberSpying
Label: Cyber Spying
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Cyber Stalking

IRI https://w3id.org/dpv/risk#CyberStalking
Term: CyberStalking
Label: Cyber Stalking
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Damage by Third Party

IRI https://w3id.org/dpv/risk#DamageByThirdParty
Term: DamageByThirdParty
Label: Damage by Third Party
Description:
SubType of: dpv:Damage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Danger to Customers

IRI https://w3id.org/dpv/risk#DangertoCustomers
Term: DangertoCustomers
Label: Danger to Customers
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Danger to Personnel

IRI https://w3id.org/dpv/risk#DangertoPersonnel
Term: DangertoPersonnel
Label: Danger to Personnel
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Data Breach

IRI https://w3id.org/dpv/risk#DataBreach
Term: DataBreach
Label: Data Breach
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Denial of Service Attack (DoS)

IRI https://w3id.org/dpv/risk#DenialServiceAttack
Term: DenialServiceAttack
Label: Denial of Service Attack (DoS)
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Detriment to Recovery

IRI https://w3id.org/dpv/risk#DetrimentToRecovery
Term: DetrimentToRecovery
Label: Detriment to Recovery
Description:
SubType of: dpv:Detriment
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Discrimination

IRI https://w3id.org/dpv/risk#Discrimination
Term: Discrimination
Label: Discrimination
Description:
SubType of: dpv:Harm
Created:
Contributor(s): Georg P Krog

Distributed Denial of Service Attack (DDoS)

IRI https://w3id.org/dpv/risk#DistributedDenialServiceAttack
Term: DistributedDenialServiceAttack
Label: Distributed Denial of Service Attack (DDoS)
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Eavesdropping

IRI https://w3id.org/dpv/risk#Eavesdropping
Term: Eavesdropping
Label: Eavesdropping
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Economic Disadvantage

IRI https://w3id.org/dpv/risk#EconomicDisadvantage
Term: EconomicDisadvantage
Label: Economic Disadvantage
Description:
SubType of: dpv:Impact
Created:
Contributor(s): Georg P Krog

Environmental Safety Endangerment

IRI https://w3id.org/dpv/risk#EnvironmentalSafetyEndangerment
Term: EnvironmentalSafetyEndangerment
Label: Environmental Safety Endangerment
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Equipment Failure

IRI https://w3id.org/dpv/risk#EquipmentFailure
Term: EquipmentFailure
Label: Equipment Failure
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Equipment Malfunction

IRI https://w3id.org/dpv/risk#EquipmentMalfunction
Term: EquipmentMalfunction
Label: Equipment Malfunction
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Errornous System Use

IRI https://w3id.org/dpv/risk#ErrornousSystemUse
Term: ErrornousSystemUse
Label: Errornous System Use
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Extorsion

IRI https://w3id.org/dpv/risk#Extorsion
Term: Extorsion
Label: Extorsion
Description:
SubType of: dpv:Harm
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Financial Equipment Costs

IRI https://w3id.org/dpv/risk#FinancialEquipmentCosts
Term: FinancialEquipmentCosts
Label: Financial Equipment Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Financial Investigation Costs

IRI https://w3id.org/dpv/risk#FinancialInvestigationCosts
Term: FinancialInvestigationCosts
Label: Financial Investigation Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Financial Loss

IRI https://w3id.org/dpv/risk#FinancialLoss
Term: FinancialLoss
Label: Financial Loss
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Financial Personnel Costs

IRI https://w3id.org/dpv/risk#FinancialPersonnelCosts
Term: FinancialPersonnelCosts
Label: Financial Personnel Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Financial Repair Costs

IRI https://w3id.org/dpv/risk#FinancialRepairCosts
Term: FinancialRepairCosts
Label: Financial Repair Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Fraud

IRI https://w3id.org/dpv/risk#Fraud
Term: Fraud
Label: Fraud
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Government Crisis

IRI https://w3id.org/dpv/risk#GovernmentCrisis
Term: GovernmentCrisis
Label: Government Crisis
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Harmful Spech

IRI https://w3id.org/dpv/risk#HarmfulSpeech
Term: HarmfulSpeech
Label: Harmful Spech
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Health and life impact

IRI https://w3id.org/dpv/risk#HealthLifeImpact
Term: HealthLifeImpact
Label: Health and life impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Human Errors

IRI https://w3id.org/dpv/risk#HumanErrors
Term: HumanErrors
Label: Human Errors
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Identity Dispute

IRI https://w3id.org/dpv/risk#IdentityDispute
Term: IdentityDispute
Label: Identity Dispute
Description:
SubType of: dpv:Detriment
Created:
Contributor(s): Harshvardhan J. Pandit

Identity Fraud

IRI https://w3id.org/dpv/risk#IdentityFraud
Term: IdentityFraud
Label: Identity Fraud
Description:
SubType of: dpv:Harm
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Identity Theft

IRI https://w3id.org/dpv/risk#IdentityTheft
Term: IdentityTheft
Label: Identity Theft
Description:
SubType of: dpv:Harm
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Illegal Processing of Data

IRI https://w3id.org/dpv/risk#IllegalProcessingData
Term: IllegalProcessingData
Label: Illegal Processing of Data
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Impact on Data Subject

IRI https://w3id.org/dpv/risk#ImpactOnDataSubject
Term: ImpactOnDataSubject
Label: Impact on Data Subject
Description:
SubType of: dpv:Impact
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

Impact to Rights

IRI https://w3id.org/dpv/risk#ImpacttoRights
Term: ImpacttoRights
Label: Impact to Rights
Description:
SubType of: dpv:Impact
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Increase Internal Cost

IRI https://w3id.org/dpv/risk#IncreaseInternalCost
Term: IncreaseInternalCost
Label: Increase Internal Cost
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Industrial Crisis

IRI https://w3id.org/dpv/risk#IndustrialCrisis
Term: IndustrialCrisis
Label: Industrial Crisis
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Injury

IRI https://w3id.org/dpv/risk#Injury
Term: Injury
Label: Injury
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Interception of Communications

IRI https://w3id.org/dpv/risk#InterceptionCommunications
Term: InterceptionCommunications
Label: Interception of Communications
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Internal Operation Disruption

IRI https://w3id.org/dpv/risk#InternalOperationDisruption
Term: InternalOperationDisruption
Label: Internal Operation Disruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Known Vulnerability Exploited

IRI https://w3id.org/dpv/risk#KnownVulnerabilityExploited
Term: KnownVulnerabilityExploited
Label: Known Vulnerability Exploited
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Law Enforcement Adverse Effects

IRI https://w3id.org/dpv/risk#LawEnforcementAdverseEffects
Term: LawEnforcementAdverseEffects
Label: Law Enforcement Adverse Effects
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Limitation of Rights

IRI https://w3id.org/dpv/risk#LimitationOfRights
Term: LimitationOfRights
Label: Limitation of Rights
Description:
SubType of: dpv:Harm
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

Loss of Assets

IRI https://w3id.org/dpv/risk#LossAssets
Term: LossAssets
Label: Loss of Assets
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Competitive Advantage

IRI https://w3id.org/dpv/risk#LossCompetitiveAdvantage
Term: LossCompetitiveAdvantage
Label: Loss of Competitive Advantage
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Control over Data

IRI https://w3id.org/dpv/risk#LossControlOverData
Term: LossControlOverData
Label: Loss of Control over Data
Description:
SubType of: dpv:NonMaterialDamage
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

Loss of Credibility

IRI https://w3id.org/dpv/risk#LossCredibility
Term: LossCredibility
Label: Loss of Credibility
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Customer Confidence

IRI https://w3id.org/dpv/risk#LossCustomerConfidence
Term: LossCustomerConfidence
Label: Loss of Customer Confidence
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Customers

IRI https://w3id.org/dpv/risk#LossCustomers
Term: LossCustomers
Label: Loss of Customers
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Data

IRI https://w3id.org/dpv/risk#LossData
Term: LossData
Label: Loss of Data
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Funds

IRI https://w3id.org/dpv/risk#LossFunds
Term: LossFunds
Label: Loss of Funds
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Goods

IRI https://w3id.org/dpv/risk#LossGoods
Term: LossGoods
Label: Loss of Goods
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Goodwill

IRI https://w3id.org/dpv/risk#LossGoodwill
Term: LossGoodwill
Label: Loss of Goodwill
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Negotiating Capacity

IRI https://w3id.org/dpv/risk#LossNegotiatingCapacity
Term: LossNegotiatingCapacity
Label: Loss of Negotiating Capacity
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Opportunity

IRI https://w3id.org/dpv/risk#LossOpportunity
Term: LossOpportunity
Label: Loss of Opportunity
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Proprietary Information

IRI https://w3id.org/dpv/risk#LossProprietaryInformation
Term: LossProprietaryInformation
Label: Loss of Proprietary Information
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Reputation

IRI https://w3id.org/dpv/risk#LossReputation
Term: LossReputation
Label: Loss of Reputation
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Resources

IRI https://w3id.org/dpv/risk#LossResources
Term: LossResources
Label: Loss of Resources
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Suppliers

IRI https://w3id.org/dpv/risk#LossSuppliers
Term: LossSuppliers
Label: Loss of Suppliers
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Technological Advantage

IRI https://w3id.org/dpv/risk#LossTechnologicalAdvantage
Term: LossTechnologicalAdvantage
Label: Loss of Technological Advantage
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Loss of Trust

IRI https://w3id.org/dpv/risk#LossTrust
Term: LossTrust
Label: Loss of Trust
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Malicious Code Attack

IRI https://w3id.org/dpv/risk#MaliciousCodeAttack
Term: MaliciousCodeAttack
Label: Malicious Code Attack
Description: Intentional use of software by including or inserting in a system for a harmful purpose
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Malware Attack

IRI https://w3id.org/dpv/risk#MalwareAttack
Term: MalwareAttack
Label: Malware Attack
Description: Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system
SubType of: dpv:Detriment
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

MisinformationDisinformation

IRI https://w3id.org/dpv/risk#MisinformationDisinformation
Term: MisinformationDisinformation
Label: MisinformationDisinformation
Description: Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)
SubType of: dpv:Detriment
Source: ENISA Threat Landscape 2021
Created:
Contributor(s): Harshvardhan J. Pandit

Misuse of Breached Information

IRI https://w3id.org/dpv/risk#MisuseBreachedInformation
Term: MisuseBreachedInformation
Label: Misuse of Breached Information
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Organisation Disruption

IRI https://w3id.org/dpv/risk#OrganisationDisruption
Term: OrganisationDisruption
Label: Organisation Disruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Personal Safety Endangerment

IRI https://w3id.org/dpv/risk#PersonalSafetyEndangerment
Term: PersonalSafetyEndangerment
Label: Personal Safety Endangerment
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Personnel Absence

IRI https://w3id.org/dpv/risk#PersonnelAbsence
Term: PersonnelAbsence
Label: Personnel Absence
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Phishing Scam

IRI https://w3id.org/dpv/risk#PhishingScam
Term: PhishingScam
Label: Phishing Scam
Description: A type of social engineering attack involving deceptive messages intended to reveal sensitive information
SubType of: dpv:Harm
Source: ENISA Threat Landscape for Ransomware Attacks 2022
Created:
Contributor(s): Harshvardhan J. Pandit

Physical Assault

IRI https://w3id.org/dpv/risk#PhysicalAssault
Term: PhysicalAssault
Label: Physical Assault
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Physical Spying

IRI https://w3id.org/dpv/risk#PhysicalSpying
Term: PhysicalSpying
Label: Physical Spying
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Physical Stalking

IRI https://w3id.org/dpv/risk#PhysicalStalking
Term: PhysicalStalking
Label: Physical Stalking
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Prevent Exercising of Rights

IRI https://w3id.org/dpv/risk#PreventExercisingOfRights
Term: PreventExercisingOfRights
Label: Prevent Exercising of Rights
Description:
SubType of: dpv:Harm
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

Privacy impact

IRI https://w3id.org/dpv/risk#PrivacyImpact
Term: PrivacyImpact
Label: Privacy impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Psychological Harm

IRI https://w3id.org/dpv/risk#PsychologicalHarm
Term: PsychologicalHarm
Label: Psychological Harm
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Public Order Breach

IRI https://w3id.org/dpv/risk#PublicOrderBreach
Term: PublicOrderBreach
Label: Public Order Breach
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

RansomwareAttack

IRI https://w3id.org/dpv/risk#RansomwareAttack
Term: RansomwareAttack
Label: RansomwareAttack
Description: Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality
SubType of: dpv:NonMaterialDamage
Source: ENISA Threat Landscape for Ransomware Attacks 2022, ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Remote Spying

IRI https://w3id.org/dpv/risk#RemoteSpying
Term: RemoteSpying
Label: Remote Spying
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Replacement Costs

IRI https://w3id.org/dpv/risk#ReplacementCosts
Term: ReplacementCosts
Label: Replacement Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Reputation and trust impact

IRI https://w3id.org/dpv/risk#ReputationTrustImpact
Term: ReputationTrustImpact
Label: Reputation and trust impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Retrieval of Deleted Data

IRI https://w3id.org/dpv/risk#RetrievalDeletedData
Term: RetrievalDeletedData
Label: Retrieval of Deleted Data
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Retrieval of Discarded Equipment

IRI https://w3id.org/dpv/risk#RetrievalDiscardedEquipment
Term: RetrievalDiscardedEquipment
Label: Retrieval of Discarded Equipment
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Sabotage

IRI https://w3id.org/dpv/risk#Sabotage
Term: Sabotage
Label: Sabotage
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Scam

IRI https://w3id.org/dpv/risk#Scam
Term: Scam
Label: Scam
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Security Breach

IRI https://w3id.org/dpv/risk#SecurityBreach
Term: SecurityBreach
Label: Security Breach
Description:
SubType of: dpv:Consequence
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Service Interruption

IRI https://w3id.org/dpv/risk#ServiceInterruption
Term: ServiceInterruption
Label: Service Interruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Sexual Violence

IRI https://w3id.org/dpv/risk#SexualViolence
Term: SexualViolence
Label: Sexual Violence
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Social Disadvantage

IRI https://w3id.org/dpv/risk#SocialDisadvantage
Term: SocialDisadvantage
Label: Social Disadvantage
Description:
SubType of: dpv:Impact
Created:
Contributor(s): Georg P Krog

Spam

IRI https://w3id.org/dpv/risk#Spam
Term: Spam
Label: Spam
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Spoofing

IRI https://w3id.org/dpv/risk#Spoofing
Term: Spoofing
Label: Spoofing
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Spying

IRI https://w3id.org/dpv/risk#Spying
Term: Spying
Label: Spying
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Stalking

IRI https://w3id.org/dpv/risk#Stalking
Term: Stalking
Label: Stalking
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

System Failure

IRI https://w3id.org/dpv/risk#SystemFailure
Term: SystemFailure
Label: System Failure
Description:
SubType of: dpv:Detriment
Source: ENISA Threat Landscape for Ransomware Attacks 2022
Created:
Contributor(s): Harshvardhan J. Pandit

System Intrusion

IRI https://w3id.org/dpv/risk#SystemIntrusion
Term: SystemIntrusion
Label: System Intrusion
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

System Malfunction

IRI https://w3id.org/dpv/risk#SystemMalfunction
Term: SystemMalfunction
Label: System Malfunction
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Terrorism

IRI https://w3id.org/dpv/risk#Terrorism
Term: Terrorism
Label: Terrorism
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Theft

IRI https://w3id.org/dpv/risk#Theft
Term: Theft
Label: Theft
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Theft of Equipment

IRI https://w3id.org/dpv/risk#TheftEquipment
Term: TheftEquipment
Label: Theft of Equipment
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Theft of Media

IRI https://w3id.org/dpv/risk#TheftMedia
Term: TheftMedia
Label: Theft of Media
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Third Party Operation Disruption

IRI https://w3id.org/dpv/risk#ThirdPartyOperationDisruption
Term: ThirdPartyOperationDisruption
Label: Third Party Operation Disruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Access to Premises

IRI https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises
Term: UnauthorisedAccesstoPremises
Label: Unauthorised Access to Premises
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Code Access

IRI https://w3id.org/dpv/risk#UnauthorisedCodeAccess
Term: UnauthorisedCodeAccess
Label: Unauthorised Code Access
Description:
SubType of: dpv:Detriment
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Code Disclosure

IRI https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
Term: UnauthorisedCodeDisclosure
Label: Unauthorised Code Disclosure
Description:
SubType of: dpv:Detriment
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Code Modification

IRI https://w3id.org/dpv/risk#UnauthorisedCodeModification
Term: UnauthorisedCodeModification
Label: Unauthorised Code Modification
Description:
SubType of: dpv:Damage
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Data Access

IRI https://w3id.org/dpv/risk#UnauthorisedDataAccess
Term: UnauthorisedDataAccess
Label: Unauthorised Data Access
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Data Disclosure

IRI https://w3id.org/dpv/risk#UnauthorisedDataDisclosure
Term: UnauthorisedDataDisclosure
Label: Unauthorised Data Disclosure
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Data Modification

IRI https://w3id.org/dpv/risk#UnauthorisedDataModification
Term: UnauthorisedDataModification
Label: Unauthorised Data Modification
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Impersonation

IRI https://w3id.org/dpv/risk#UnauthorisedImpersonation
Term: UnauthorisedImpersonation
Label: Unauthorised Impersonation
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Information Disclosure

IRI https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure
Term: UnauthorisedInformationDisclosure
Label: Unauthorised Information Disclosure
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised Re-Identification

IRI https://w3id.org/dpv/risk#UnauthorisedReIdentification
Term: UnauthorisedReIdentification
Label: Unauthorised Re-Identification
Description:
SubType of: dpv:Consequence
Created:
Contributor(s): Georg P Krog

Unauthorised Resource Use

IRI https://w3id.org/dpv/risk#UnauthorisedResourceUse
Term: UnauthorisedResourceUse
Label: Unauthorised Resource Use
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised System Access

IRI https://w3id.org/dpv/risk#UnauthorisedSystemAccess
Term: UnauthorisedSystemAccess
Label: Unauthorised System Access
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unauthorised System Modification

IRI https://w3id.org/dpv/risk#UnauthorisedSystemModification
Term: UnauthorisedSystemModification
Label: Unauthorised System Modification
Description:
SubType of: dpv:Damage
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Unknown Vulnerability Exploited

IRI https://w3id.org/dpv/risk#UnknownVulnerabilityExploited
Term: UnknownVulnerabilityExploited
Label: Unknown Vulnerability Exploited
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unwanted Code Deletion

IRI https://w3id.org/dpv/risk#UnwantedCodeDeletion
Term: UnwantedCodeDeletion
Label: Unwanted Code Deletion
Description:
SubType of: dpv:Damage
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

Unwanted Data Deletion

IRI https://w3id.org/dpv/risk#UnwantedDataDeletion
Term: UnwantedDataDeletion
Label: Unwanted Data Deletion
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Unwanted Disclosure of Data

IRI https://w3id.org/dpv/risk#UnwantedDisclosureData
Term: UnwantedDisclosureData
Label: Unwanted Disclosure of Data
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Vandalism

IRI https://w3id.org/dpv/risk#Vandalism
Term: Vandalism
Label: Vandalism
Description:
SubType of: dpv:Damage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

Violation of Code of Conduct

IRI https://w3id.org/dpv/risk#ViolationCodeConduct
Term: ViolationCodeConduct
Label: Violation of Code of Conduct
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Violation of Contractual Obligations

IRI https://w3id.org/dpv/risk#ViolationContractualObligations
Term: ViolationContractualObligations
Label: Violation of Contractual Obligations
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Violation of Ethical Code

IRI https://w3id.org/dpv/risk#ViolationEthicalCode
Term: ViolationEthicalCode
Label: Violation of Ethical Code
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Violation of Rights

IRI https://w3id.org/dpv/risk#ViolationOfRights
Term: ViolationOfRights
Label: Violation of Rights
Description:
SubType of: dpv:Harm
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

Violation of Regulatory Obligations

IRI https://w3id.org/dpv/risk#ViolationRegulatoryObligations
Term: ViolationRegulatoryObligations
Label: Violation of Regulatory Obligations
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Violation of Statutory Obligations

IRI https://w3id.org/dpv/risk#ViolationStatutoryObligations
Term: ViolationStatutoryObligations
Label: Violation of Statutory Obligations
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Vulnerability Created

IRI https://w3id.org/dpv/risk#VulnerabilityCreated
Term: VulnerabilityCreated
Label: Vulnerability Created
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

Vulnerability Exploited

IRI https://w3id.org/dpv/risk#VulnerabilityExploited
Term: VulnerabilityExploited
Label: Vulnerability Exploited
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Assessment Techniques

Classes

ALARA | ALARP | Bayesian Analysis | Bayesian Networks | Bow Tie Analysis | Brainstorming | Business Impact Analysis | Causal Mapping | Cause-Consequence Analysis | Checklists | Cindynic Approach | Classifications | Cost/benefit Analysis | Cross Impact Analysis | Conditional Value at Risk (CVaR) | Decision Tree Analysis | Delphi Technique | Data Protection Impact Assessment (DPIA) | Event Tree Analysis | Fault Tree Analysis | Ishikawa (Fishbone) | Failure Modes And Effects Analysis (FMEA) | Failure Modes And Effects And Criticality Analysis (FMECA) | F-N Diagrams | Game Theory | Hazard Analysis And Critical Control Points (HACCP) | Hazard And Operability Studies (HAZOP) | Human Reliability Analysis | Influence Diagrams | Interviews | Layer Protection Analysis (LOPA) | Markov Analysis | Multi-criteria Analysis (MCA) | Monte Carlo Simulation | Nominal Group Technique | Pareto Charts | Privacy Impact Analysis (PIA) | Qualitative Risk Assessment Technique | Quantitative Risk Assessment Technique | Reliability Centred Maintenance | Risk Assessment Technique | Risk Indices | Risk Matrix | Risk Registers | Scenario Analysis | S-curves | SFAIRP | Surveys | Structured "What If?" (SWIFT) | Taxonomies | Toxicological Risk Assessment | Value At Risk (VaR) |

ALARA

IRI https://w3id.org/dpv/risk#ALARA
Term: ALARA
Label: ALARA
Description: As Low as Resonably Achievable (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

ALARP

IRI https://w3id.org/dpv/risk#ALARP
Term: ALARP
Label: ALARP
Description: As Low as Resonably Possible (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Bayesian Analysis

IRI https://w3id.org/dpv/risk#BayesianAnalysis
Term: BayesianAnalysis
Label: Bayesian Analysis
Description: A means of making inference about model parameters using Bayes' theorem which has the capability of incorporating empirical data into prior judgements about probabilities
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Bayesian Networks

IRI https://w3id.org/dpv/risk#BayesianNetworks
Term: BayesianNetworks
Label: Bayesian Networks
Description: A graphical model of variables and their cause-effect relationships expressed using probabilities
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Bow Tie Analysis

IRI https://w3id.org/dpv/risk#BowTie
Term: BowTie
Label: Bow Tie Analysis
Description: A diagrammatic way of describing the pathways from sources of risk to outcomes, and of reviewing controls
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Brainstorming

IRI https://w3id.org/dpv/risk#Brainstorming
Term: Brainstorming
Label: Brainstorming
Description: Technique used in workshops to encourage imaginative thinking
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Business Impact Analysis

IRI https://w3id.org/dpv/risk#BusinessImpactAnalysis
Term: BusinessImpactAnalysis
Label: Business Impact Analysis
Description: A process that analyses the consequences of a disruptive incident on the organization which determines the recovery priorities of an organization's products and services and, thereby, the priorities of the activities and resources which deliver them
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Causal Mapping

IRI https://w3id.org/dpv/risk#CausalMapping
Term: CausalMapping
Label: Causal Mapping
Description: A network diagram representing events, causes and effects and their relationships.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Cause-Consequence Analysis

IRI https://w3id.org/dpv/risk#CauseConsequenceAnalysis
Term: CauseConsequenceAnalysis
Label: Cause-Consequence Analysis
Description: A combination of fault and event tree analysis that allows inclusion of time delays. Both causes and consequences of an initiating event are considered.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Checklists

IRI https://w3id.org/dpv/risk#Checklists
Term: Checklists
Label: Checklists
Description: A checklist based on experience or on concepts and models that can be used to help identify risks or controls.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Cindynic Approach

IRI https://w3id.org/dpv/risk#Cindynic
Term: Cindynic
Label: Cindynic Approach
Description: Considers goals, values, rules, data and models of stakeholders and identifies inconsistencies, ambiguities, omissions and ignorance. These form systemic sources and drivers of risk.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Classifications

IRI https://w3id.org/dpv/risk#Classifications
Term: Classifications
Label: Classifications
Description: A classification list based on experience or on concepts and models that can be used to help identify risks or controls.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Cost/benefit Analysis

IRI https://w3id.org/dpv/risk#CostBenefitAnalysis
Term: CostBenefitAnalysis
Label: Cost/benefit Analysis
Description: Uses money as a scale for estimating positive and negative, tangible and intangible, consequences of different options.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Cross Impact Analysis

IRI https://w3id.org/dpv/risk#CrossImpactAnalysis
Term: CrossImpactAnalysis
Label: Cross Impact Analysis
Description: Evaluates changes in the probability of the occurrence of a given set of events consequent on the actual occurrence of one of them.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Conditional Value at Risk (CVaR)

IRI https://w3id.org/dpv/risk#CVaR
Term: CVaR
Label: Conditional Value at Risk (CVaR)
Description: A measure of the expected loss from a financial portfolio in the worst a % of cases. Also called expected shortfall (ES)
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Decision Tree Analysis

IRI https://w3id.org/dpv/risk#DecisionTreeAnalysis
Term: DecisionTreeAnalysis
Label: Decision Tree Analysis
Description: Uses a tree-like representation or model of decisions and their possible consequences. Outcomes are usually expressed in monetary terms or in terms of utility.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Delphi Technique

IRI https://w3id.org/dpv/risk#DelphiTechnique
Term: DelphiTechnique
Label: Delphi Technique
Description: Collects judgements through a set of sequential questionnaires. People participate individually but receive feedback on the responses of others after each set of questions.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Data Protection Impact Assessment (DPIA)

IRI https://w3id.org/dpv/risk#DPIA
Term: DPIA
Label: Data Protection Impact Assessment (DPIA)
Description: Analyses how incidents and events could affect the protection of data and its effects on persons and identifies and quantifies the capabilities that would be needed to manage it.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Event Tree Analysis

IRI https://w3id.org/dpv/risk#EventTreeAnalysis
Term: EventTreeAnalysis
Label: Event Tree Analysis
Description: Models the possible outcomes from a given initiating event and the status of controls thus analysing the frequency or probability of the various possible outcomes.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Fault Tree Analysis

IRI https://w3id.org/dpv/risk#FaultTreeAnalysis
Term: FaultTreeAnalysis
Label: Fault Tree Analysis
Description: Analyses causes of a focus event using Boolean logic to describe combinations of faults. Variations include a success tree where the top event is desired and a cause tree used to investigate past events.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Ishikawa (Fishbone)

IRI https://w3id.org/dpv/risk#Fishbone
Term: Fishbone
Label: Ishikawa (Fishbone)
Description: Identifies contributory factors to a defined outcome (wanted or unwanted). Contributory factors are usually divided into predefined categories and displayed in a tree structure or a fishbone diagram.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Failure Modes And Effects Analysis (FMEA)

IRI https://w3id.org/dpv/risk#FMEA
Term: FMEA
Label: Failure Modes And Effects Analysis (FMEA)
Description: Considers the ways in which each component of a system might fail and the failure causes and effects.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Failure Modes And Effects And Criticality Analysis (FMECA)

IRI https://w3id.org/dpv/risk#FMECA
Term: FMECA
Label: Failure Modes And Effects And Criticality Analysis (FMECA)
Description: Considers the ways in which each component of a system might fail and the failure causes and effects. FMEA followed by a criticality analysis which defines the significance of each failure mode (FMECA).
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

F-N Diagrams

IRI https://w3id.org/dpv/risk#FNDiagrams
Term: FNDiagrams
Label: F-N Diagrams
Description: Special case of quantitative consequence/likelihood graph applied to consideration of tolerability of risk to human life.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Game Theory

IRI https://w3id.org/dpv/risk#GameTheory
Term: GameTheory
Label: Game Theory
Description: The study of strategic decision making to model the impact of the decisions of different players involved in the game. Example application area can be risk based pricing.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Hazard Analysis And Critical Control Points (HACCP)

IRI https://w3id.org/dpv/risk#HACCP
Term: HACCP
Label: Hazard Analysis And Critical Control Points (HACCP)
Description: Analyses the risk reduction that can be achieved by various layers of protection.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Hazard And Operability Studies (HAZOP)

IRI https://w3id.org/dpv/risk#HAZOP
Term: HAZOP
Label: Hazard And Operability Studies (HAZOP)
Description: A structured and systematic examination of a planned or existing process or operation in order to identify and evaluate problems that might represent risk to personnel or equipment, or prevent efficient operation
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Human Reliability Analysis

IRI https://w3id.org/dpv/risk#HumanReliabilityAnalysis
Term: HumanReliabilityAnalysis
Label: Human Reliability Analysis
Description: A set of techniques for identifying the potential for human error and estimating the likelihood of failure.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Influence Diagrams

IRI https://w3id.org/dpv/risk#InfluenceDiagrams
Term: InfluenceDiagrams
Label: Influence Diagrams
Description: An extended version of Bayesian networks that includes variables representing uncertainties, consequences and actions
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Interviews

IRI https://w3id.org/dpv/risk#Interviews
Term: Interviews
Label: Interviews
Description: Structured or semi- structured one-to-one conversations to elicit views.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Layer Protection Analysis (LOPA)

IRI https://w3id.org/dpv/risk#LOPA
Term: LOPA
Label: Layer Protection Analysis (LOPA)
Description: Analyses the risk reduction that can be achieved by various layers of protection.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Markov Analysis

IRI https://w3id.org/dpv/risk#MarkovAnalysis
Term: MarkovAnalysis
Label: Markov Analysis
Description: Calculates the probability that a system that has the capacity to be in one of a number of states will be in a particular state at a time t in the future.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Multi-criteria Analysis (MCA)

IRI https://w3id.org/dpv/risk#MCA
Term: MCA
Label: Multi-criteria Analysis (MCA)
Description: Compares options in a way that makes trade-offs explicit. Provides an alternative to cost/benefit analysis that does not need a monetary value to be allocated to all inputs.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Monte Carlo Simulation

IRI https://w3id.org/dpv/risk#MonteCarloSimulation
Term: MonteCarloSimulation
Label: Monte Carlo Simulation
Description: Calculates the probability of outcomes by running multiple simulations using random variables.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Nominal Group Technique

IRI https://w3id.org/dpv/risk#NominalGroupTechnique
Term: NominalGroupTechnique
Label: Nominal Group Technique
Description: Technique for eliciting views from a group of people where initial participation is as individuals with no interaction, then group discussion of ideas follows.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Pareto Charts

IRI https://w3id.org/dpv/risk#ParetoCharts
Term: ParetoCharts
Label: Pareto Charts
Description: The Pareto principle (the 80–20 rule) states that, for many events, roughly 80 % of the effects come from 20 % of the causes.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Privacy Impact Analysis (PIA)

IRI https://w3id.org/dpv/risk#PIA
Term: PIA
Label: Privacy Impact Analysis (PIA)
Description: Analyses how incidents and events could affect a person's privacy and identifies and quantifies the capabilities that would be needed to manage it.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Qualitative Risk Assessment Technique

IRI https://w3id.org/dpv/risk#QualitativeRiskAssessmentTechnique
Term: QualitativeRiskAssessmentTechnique
Label: Qualitative Risk Assessment Technique
Description: A risk assessment technique that uses qualitative methods
SubType of: risk:RiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Quantitative Risk Assessment Technique

IRI https://w3id.org/dpv/risk#QuantitativeRiskAssessmentTechnique
Term: QuantitativeRiskAssessmentTechnique
Label: Quantitative Risk Assessment Technique
Description: A risk assessment technique that uses quantitative methods
SubType of: risk:RiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Reliability Centred Maintenance

IRI https://w3id.org/dpv/risk#ReliabilityCentredMaintenance
Term: ReliabilityCentredMaintenance
Label: Reliability Centred Maintenance
Description: A risk based assessment used to identify the appropriate maintenance tasks for a system and its components.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Assessment Technique

IRI https://w3id.org/dpv/risk#RiskAssessmentTechnique
Term: RiskAssessmentTechnique
Label: Risk Assessment Technique
Description: A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
SubType of: dpv:RiskManagementProcedure
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Indices

IRI https://w3id.org/dpv/risk#RiskIndices
Term: RiskIndices
Label: Risk Indices
Description: Rates the significance of risks based on ratings applied to factors which are believed to influence the magnitude of the risk.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Matrix

IRI https://w3id.org/dpv/risk#RiskMatrix
Term: RiskMatrix
Label: Risk Matrix
Description: Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Registers

IRI https://w3id.org/dpv/risk#RiskRegisters
Term: RiskRegisters
Label: Risk Registers
Description: A means of recording information about risks and tracking actions.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Scenario Analysis

IRI https://w3id.org/dpv/risk#ScenarioAnalysis
Term: ScenarioAnalysis
Label: Scenario Analysis
Description: Identifies possible future scenarios through imagination, extrapolation from the present or modelling. Risk is then considered for each of these scenarios.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

S-curves

IRI https://w3id.org/dpv/risk#SCurves
Term: SCurves
Label: S-curves
Description: A means of displaying the relationship between consequences and their likelihood plotted as a cumulative distribution function (S-curve).
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

SFAIRP

IRI https://w3id.org/dpv/risk#SFAIRP
Term: SFAIRP
Label: SFAIRP
Description: So far as is Resonably Practiceable (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Surveys

IRI https://w3id.org/dpv/risk#Surveys
Term: Surveys
Label: Surveys
Description: Paper- or computer-based questionnaires to elicit views.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Structured "What If?" (SWIFT)

IRI https://w3id.org/dpv/risk#SWIFT
Term: SWIFT
Label: Structured "What If?" (SWIFT)
Description: A simpler form of HAZOP with prompts of "what if" to identify deviations from the expected.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Taxonomies

IRI https://w3id.org/dpv/risk#Taxonomies
Term: Taxonomies
Label: Taxonomies
Description: A taxonomy based on experience or on concepts and models that can be used to help identify risks or controls.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Toxicological Risk Assessment

IRI https://w3id.org/dpv/risk#Toxicological
Term: Toxicological
Label: Toxicological Risk Assessment
Description: A series of steps taken to obtain a measure for the risk to humans or ecological systems due to exposure to chemicals.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Value At Risk (VaR)

IRI https://w3id.org/dpv/risk#VaR
Term: VaR
Label: Value At Risk (VaR)
Description: Financial measure of risk that uses an assumed probability distribution of losses in a stable market condition to calculate the value of a loss that might occur with a specified probability within a defined time span.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Methodology

Classes

ACSC-ISM | ANSI/ISA-62443-3‑2-2020 | BSI Standard 200-2 | CCRACII | CORAS | CRAMM | EBIOS | ERM-IF | ETSI TS 102 165-1 | ITSRM² | FAIR | FAIR Privacy | GCSOS | HITRUST-CSF | IMO MSC-FAL.1/CIRC.3 | IRAM2 | IS-BM | ISACA-RISK-IT | ISAMM | ISO/IEC 27005:2018 | ISRAM | IT-Grundschutz | MAGERIT | MEHARI | MONARC | NIST SP 800-30 | NIST SP 800-37 | NIST SP 800–39 | NIST SP 800–82 | O-RA | OCTAVE | OCTAVE ALLEGRO | OCTAVE FORTE | OCTAVE-S | Risk Management Methodology |

ACSC-ISM

IRI https://w3id.org/dpv/risk#ACSC-ISM
Term: ACSC-ISM
Label: ACSC-ISM
Description: The Australian Cyber Security Centre (ACSC) published the Australian Government Information Security Manual (ISM) which adopts the use of a risk management framework that draws from NIST 800-37, and includes six steps: define the system, select security controls, implement security controls, assess security controls, authorise the system and monitor the system
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

ANSI/ISA-62443-3‑2-2020

IRI https://w3id.org/dpv/risk#ANSI-ISA-62443-3‑2-2020
Term: ANSI-ISA-62443-3‑2-2020
Label: ANSI/ISA-62443-3‑2-2020
Description: ANSI/ISA-62443-3-2-2020 standard, entitled ‘Security for industrial automation and control systems, Part 3-2: Security risk assessment for system design’, from the International Society of Automation (ISA), dedicates an entire part to the assessment of security risk for system design targeting Security and IT professionals
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

BSI Standard 200-2

IRI https://w3id.org/dpv/risk#BSI-200-2
Term: BSI-200-2
Label: BSI Standard 200-2
Description: The BSI-Standard 200-2 (‘IT-Grundschutz Methodology’) provides a methodology for the management of information security which can be adapted to the requirements of organisations of various types and sizes
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

CCRACII

IRI https://w3id.org/dpv/risk#CCRACII
Term: CCRACII
Label: CCRACII
Description: The Guide to Conducting Cybersecurity Risk Assessment for Critical Information Infrastructure (CCRACII) defines commonly used terms such as threat event, vulnerability, likelihood, impact and risk, roles, and responsibilities, in addition to a range for risk levels, ranging from low to very high with different level of risk toleranc
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

CORAS

IRI https://w3id.org/dpv/risk#CORAS
Term: CORAS
Label: CORAS
Description: The CORAS method was developed and is supported by SourceForge. It is a method for conducting the analysis and management of security risk. It provides a customised language for modelling threats and risks as well as detailed guidelines explaining how the language should be used to capture and model relevant information during the various stages of the security analysis
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

CRAMM

IRI https://w3id.org/dpv/risk#CRAMM
Term: CRAMM
Label: CRAMM
Description: CCTA Risk Assessment and Management Methodology (CRAMM) is a method that an analyst or group of analysts may use to evaluate the security and risk level of an organisation by analysing and combining the diverse knowledge distributed in the local corporate environment
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

EBIOS

IRI https://w3id.org/dpv/risk#EBIOS
Term: EBIOS
Label: EBIOS
Description: Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS) Risk Manager is an information security risk management method, created under the French General Secretariat of National Defence, consistent with ISO 31000 and ISO/IEC 27005, and enables the risk management requirements of ISO/IEC 27001 to be met
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

ERM-IF

IRI https://w3id.org/dpv/risk#ERM-IF
Term: ERM-IF
Label: ERM-IF
Description: Enterprise Risk Management - Integrated Framework (ERM-IF) defines the essential components of enterprise risk management. It is based on a set of principles and concepts for the enterprise and has as its objective to offer a common language for enterprise risk
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

ETSI TS 102 165-1

IRI https://w3id.org/dpv/risk#ETSI-TS-102-165-1
Term: ETSI-TS-102-165-1
Label: ETSI TS 102 165-1
Description: ETSI TS 102 165-1 offers methodology and pro-forma for threat, vulnerability and risk analysis (TVRA). According to ETSI TS 102 165-1, threat vulnerability and risk analysis (TVRA) is used to identify risk to an information system based upon the product of the likelihood of an attack and the impact that such an attack will have on the system
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

ITSRM²

IRI https://w3id.org/dpv/risk#EU-ITSRM
Term: EU-ITSRM
Label: ITSRM²
Description: ITSRM² IT Security Risk Management Methodology is a methodology provided by DG DIGIT and the European Commission as part of a set of standards for information security
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

FAIR

IRI https://w3id.org/dpv/risk#FAIR
Term: FAIR
Label: FAIR
Description: The purpose of the FAIR (Factor Analysis of Information Risk) model is to help organisations understand, analyse, and measure information risk. The model provides an approach to quantify risk and defines the necessary building blocks for implementing effective cyber risk management programmes
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

FAIR Privacy

IRI https://w3id.org/dpv/risk#FAIR-Privacy
Term: FAIR-Privacy
Label: FAIR Privacy
Description: Factors Analysis in Information Risk (FAIR Privacy) is a quantitative privacy risk framework based on FAIR (Factors Analysis in Information Risk) that examines personal privacy risks (to individuals), not organisational risks
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

GCSOS

IRI https://w3id.org/dpv/risk#GCSOS
Term: GCSOS
Label: GCSOS
Description: The Guidelines on Cyber Security Onboard Ships (GCSOS) guidelines explain why and how cyber risks should be managed in a shipping context. They outline the risk assessment process with an explanation of the part played by each component of cyber risk and offer advice on how to respond to and recover from cyber incidents
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

HITRUST-CSF

IRI https://w3id.org/dpv/risk#HITRUST-CSF
Term: HITRUST-CSF
Label: HITRUST-CSF
Description: The HITRUST Cyber-Security Framework (CSF) is a framework created by security industry experts to safeguard sensitive information and manage information risk for organisations across all industries and throughout the third-party supply chain
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

IMO MSC-FAL.1/CIRC.3

IRI https://w3id.org/dpv/risk#IMO-MSC-FAL1-CIRC3
Term: IMO-MSC-FAL1-CIRC3
Label: IMO MSC-FAL.1/CIRC.3
Description: The official International Maritime Organization guidelines IMO MSC-FAL.1/CIRC.3 provide a high-level approach to the management pf maritime cyber risk which refers to the extent a technology asset is exposed to risks during an event that could result in shipping-related operational failure
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

IRAM2

IRI https://w3id.org/dpv/risk#IRAM2
Term: IRAM2
Label: IRAM2
Description: Information Risk Assessment Methodology (IRAM2) supports risk assessment and treatment and entails a six-phase process, and is is implemented by an automated toolset
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

IS-BM

IRI https://w3id.org/dpv/risk#IS-BM
Term: IS-BM
Label: IS-BM
Description: The IS risk analysis method is based on a business model using a quantitative approach. The values of IS assets come from their importance towards operational continuity, as well as from their replacement costs
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

ISACA-RISK-IT

IRI https://w3id.org/dpv/risk#ISACA-RISK-IT
Term: ISACA-RISK-IT
Label: ISACA-RISK-IT
Description: The ISACA Risk IT Framework provides a set of guiding principles and supporting practices for enterprise management, combined to deliver a comprehensive process model for governing and managing IT risk
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

ISAMM

IRI https://w3id.org/dpv/risk#ISAMM
Term: ISAMM
Label: ISAMM
Description: Information Security Assessment and Monitoring Method (ISAMM) is a quantitative type of risk management methodology that can be applied by various organisations such as governmental agencies, large companies and small and medium size enterprises
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

ISO/IEC 27005:2018

IRI https://w3id.org/dpv/risk#ISO-IEC-27005-2018
Term: ISO-IEC-27005-2018
Label: ISO/IEC 27005:2018
Description: ISO/IEC 27005:2018 ‘Information technology — Security techniques — Information security risk management’ is a risk management framework applicable to all types of organisations (e.g. commercial enterprises, government agencies, non-profit organisations) which intend to manage risks that could compromise the organisation’s information security
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

ISRAM

IRI https://w3id.org/dpv/risk#ISRAM
Term: ISRAM
Label: ISRAM
Description: ISRAM is a quantitative, paper-based risk analysis method that is designed to allow effective participation of managers and staff in the process
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

IT-Grundschutz

IRI https://w3id.org/dpv/risk#IT-Grundschutz
Term: IT-Grundschutz
Label: IT-Grundschutz
Description: IT-Grundschutz has been developed by the Federal Office for Information Security in Germany. IT-Grundschutz provides a configuration for the establishment of an integrated and effective IT security managemen
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

MAGERIT

IRI https://w3id.org/dpv/risk#MAGERIT
Term: MAGERIT
Label: MAGERIT
Description: Method for the Harmonised Analysis of Risk (MAGERIT) is an open methodology for risk analysis and management developed by the Spanish Higher Council for Electronic Government and offered as a framework and guide to the public administration
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

MEHARI

IRI https://w3id.org/dpv/risk#MEHARI
Term: MEHARI
Label: MEHARI
Description: MEHARI is a free of charge qualitative risk analysis and management method developed by CLUSIF (Club for the Security of Information in France/Club de la Sécurité de l'Information Français)
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

MONARC

IRI https://w3id.org/dpv/risk#MONARC
Term: MONARC
Label: MONARC
Description: MONARC (Méthode Optimisée d’analyse des risques CASES – ‘Method for an Optimised Analysis of Risks by CASES’ is a tool and a method allowing precise and repeatable risk assessments to take place
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

NIST SP 800-30

IRI https://w3id.org/dpv/risk#NIST-SP-800-30
Term: NIST-SP-800-30
Label: NIST SP 800-30
Description: NIST 800-30 is a free guide that provides a foundation for the development of an effective risk management programme, containing both the definitions and the practical guidance necessary for assessing and mitigating risks identified within IT systems
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

NIST SP 800-37

IRI https://w3id.org/dpv/risk#NIST-SP-800-37
Term: NIST-SP-800-37
Label: NIST SP 800-37
Description: NIST SP 800-37 Rev. 2 is an asset-based RMF which comprises 7 steps, namely Prepare, Categorise, Select, Implement, Assess, Authorise and Monitor. It does not adopt a specific risk assessment methodology, although the NIST 800-30 guide is extensively referenced
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

NIST SP 800–39

IRI https://w3id.org/dpv/risk#NIST-SP-800-39
Term: NIST-SP-800-39
Label: NIST SP 800–39
Description: The purpose of NIST SP 800-39 is to provide a structured, yet flexible approach for an integrated, enterprise-wide programme for managing the risk to information security of organisational operations (i.e. mission, functions, image, and reputation) and assets, individuals, other organisations etc. on an ongoing basis
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

NIST SP 800–82

IRI https://w3id.org/dpv/risk#NIST-SP-800-82
Term: NIST-SP-800-82
Label: NIST SP 800–82
Description: NIST SP 800-82 Rev. 2 (Stouffer, et al., 2015), entitled ‘Guide to industrial control systems (ISC) security’, is an Industrial Control Systems Security Guide
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

O-RA

IRI https://w3id.org/dpv/risk#O-RA
Term: O-RA
Label: O-RA
Description: The Open Group Standard for Risk Analysis (O-RA) provides a set of standards for various aspects of information security risk analysis that is based on the Open FAIR framework and can be applied to any risk scenario
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

OCTAVE

IRI https://w3id.org/dpv/risk#OCTAVE
Term: OCTAVE
Label: OCTAVE
Description: Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) is a free of charge approach to evaluations of information security risk that is comprehensive, systematic, context-driven, and self-directed
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

OCTAVE ALLEGRO

IRI https://w3id.org/dpv/risk#OCTAVE-ALLEGRO
Term: OCTAVE-ALLEGRO
Label: OCTAVE ALLEGRO
Description: OCTAVE Allegro is designed to allow broad assessment of an organisation’s operational risk environment, with the goal of producing robust results without the need for extensive knowledge of risk assessment
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

OCTAVE FORTE

IRI https://w3id.org/dpv/risk#OCTAVE-FORTE
Term: OCTAVE-FORTE
Label: OCTAVE FORTE
Description: The OCTAVE FORTE process model was developed to support organisations in evaluating their security risks. It applies Enterprise Risk Management (ERM) principles to bridge the gap between executives and practitioners acting as decision makers
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

OCTAVE-S

IRI https://w3id.org/dpv/risk#OCTAVE-S
Term: OCTAVE-S
Label: OCTAVE-S
Description: The OCTAVE-S is based on the OCTAVE approach and is a self-directed approach, meaning that people from an organisation assume responsibility for setting the organisation’s security strategy
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Management Methodology

IRI https://w3id.org/dpv/risk#RiskManagementMethodology
Term: RiskManagementMethodology
Label: Risk Management Methodology
Description: A risk management framework or methodology addresses the main functional components related to identification, assessment, treatment, and monitoring regarding risks
SubType of: dpv:RiskManagementProcedure
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

RiskMatrix

Classes

Risk Matrix 3x3 | Risk Matrix 5x5 | Risk Matrix 7x7 | Low Risk (RM3x3 S:1 L:1) | Low Risk (RM3x3 S:1 L:2) | Moderate Risk (RM3x3 S:1 L:3) | Low Risk (RM3x3 S:2 L:1) | Moderate Risk (RM3x3 S:2 L:2) | High Risk (RM3x3 S:2 L:3) | Moderate Risk (RM3x3 S:3 L:1) | High Risk (RM3x3 S:3 L:2) | High Risk (RM3x3 S:3 L:3) | Very Low Risk (RM5x5 S:1 L:1) | Very Low Risk (RM5x5 S:1 L:2) | Very Low Risk (RM5x5 S:1 L:3) | Low Risk (RM5x5 S:1 L:4) | Low Risk (RM5x5 S:1 L:5) | Very Low Risk (RM5x5 S:2 L:1) | Low Risk (RM5x5 S:2 L:2) | Moderate Risk (RM5x5 S:2 L:3) | Moderate Risk (RM5x5 S:2 L:4) | High Risk (RM5x5 S:2 L:5) | Very Low Risk (RM5x5 S:3 L:1) | Moderate Risk (RM5x5 S:3 L:2) | Moderate Risk (RM5x5 S:3 L:3) | High Risk (RM5x5 S:3 L:4) | Very High Risk (RM5x5 S:3 L:5) | Low Risk (RM5x5 S:4 L:1) | Moderate Risk (RM5x5 S:4 L:2) | High Risk (RM5x5 S:4 L:3) | Very High Risk (RM5x5 S:4 L:4) | Very High Risk (RM5x5 S:4 L:5) | Low Risk (RM5x5 S:5 L:1) | High Risk (RM5x5 S:5 L:2) | High Risk (RM5x5 S:5 L:3) | Very High Risk (RM5x5 S:5 L:4) | Very High Risk (RM5x5 S:5 L:5) | Extremely Low Risk (RM7x7 S:1 L:1) | Extremely Low Risk (RM7x7 S:1 L:2) | Extremely Low Risk (RM7x7 S:1 L:3) | Very Low Risk (RM7x7 S:1 L:4) | Very Low Risk (RM7x7 S:1 L:5) | Very Low Risk (RM7x7 S:1 L:6) | Low Risk (RM7x7 S:1 L:7) | Extremely Low Risk (RM7x7 S:2 L:1) | Extremely Low Risk (RM7x7 S:2 L:2) | Very Low Risk (RM7x7 S:2 L:3) | Low Risk (RM7x7 S:2 L:4) | Low Risk (RM7x7 S:2 L:5) | Moderate Risk (RM7x7 S:2 L:6) | Moderate Risk (RM7x7 S:2 L:7) | Extremely Low Risk (RM7x7 S:3 L:1) | Very Low Risk (RM7x7 S:3 L:2) | Low Risk (RM7x7 S:3 L:3) | Moderate Risk (RM7x7 S:3 L:4) | High Risk (RM7x7 S:3 L:5) | High Risk (RM7x7 S:3 L:6) | Very High Risk (RM7x7 S:3 L:7) | Extremely Low Risk (RM7x7 S:4 L:1) | Low Risk (RM7x7 S:4 L:2) | Moderate Risk (RM7x7 S:4 L:3) | High Risk (RM7x7 S:4 L:4) | High Risk (RM7x7 S:4 L:5) | Very High Risk (RM7x7 S:4 L:6) | Very High Risk (RM7x7 S:4 L:7) | Very Low Risk (RM7x7 S:5 L:1) | Low Risk (RM7x7 S:5 L:2) | Moderate Risk (RM7x7 S:5 L:3) | High Risk (RM7x7 S:5 L:4) | Very High Risk (RM7x7 S:5 L:5) | Extremely High Risk (RM7x7 S:5 L:6) | Extremely High Risk (RM7x7 S:5 L:7) | Very Low Risk (RM7x7 S:6 L:1) | Moderate Risk (RM7x7 S:6 L:2) | High Risk (RM7x7 S:6 L:3) | Very High Risk (RM7x7 S:6 L:4) | Very High Risk (RM7x7 S:6 L:5) | Extremely High Risk (RM7x7 S:6 L:6) | Extremely High Risk (RM7x7 S:6 L:7) | Low Risk (RM7x7 S:7 L:1) | Moderate Risk (RM7x7 S:7 L:2) | High Risk (RM7x7 S:7 L:3) | Very High Risk (RM7x7 S:7 L:4) | Extremely High Risk (RM7x7 S:7 L:5) | Extremely High Risk (RM7x7 S:7 L:6) | Extremely High Risk (RM7x7 S:7 L:7) |

Risk Matrix 3x3

IRI https://w3id.org/dpv/risk#RiskMatrix3x3
Term: RiskMatrix3x3
Label: Risk Matrix 3x3
Description: A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
SubType of: risk:RiskMatrix
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Matrix 5x5

IRI https://w3id.org/dpv/risk#RiskMatrix5x5
Term: RiskMatrix5x5
Label: Risk Matrix 5x5
Description: A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
SubType of: risk:RiskMatrix
Created:
Contributor(s): Harshvardhan J. Pandit

Risk Matrix 7x7

IRI https://w3id.org/dpv/risk#RiskMatrix7x7
Term: RiskMatrix7x7
Label: Risk Matrix 7x7
Description: A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
SubType of: risk:RiskMatrix
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM3x3 S:1 L:1)

IRI https://w3id.org/dpv/risk#RM3x3S1L1
Term: RM3x3S1L1
Label: Low Risk (RM3x3 S:1 L:1)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
Instance of: risk:RiskMatrix3x3
rdf:value 0.11
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:LowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM3x3 S:1 L:2)

IRI https://w3id.org/dpv/risk#RM3x3S1L2
Term: RM3x3S1L2
Label: Low Risk (RM3x3 S:1 L:2)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
Instance of: risk:RiskMatrix3x3
rdf:value 0.22
dpv:hasRiskLevelrisk:LowRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:LowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM3x3 S:1 L:3)

IRI https://w3id.org/dpv/risk#RM3x3S1L3
Term: RM3x3S1L3
Label: Moderate Risk (RM3x3 S:1 L:3)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
Instance of: risk:RiskMatrix3x3
rdf:value 0.33
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM3x3 S:2 L:1)

IRI https://w3id.org/dpv/risk#RM3x3S2L1
Term: RM3x3S2L1
Label: Low Risk (RM3x3 S:2 L:1)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
Instance of: risk:RiskMatrix3x3
rdf:value 0.22
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM3x3 S:2 L:2)

IRI https://w3id.org/dpv/risk#RM3x3S2L2
Term: RM3x3S2L2
Label: Moderate Risk (RM3x3 S:2 L:2)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Instance of: risk:RiskMatrix3x3
rdf:value 0.44
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM3x3 S:2 L:3)

IRI https://w3id.org/dpv/risk#RM3x3S2L3
Term: RM3x3S2L3
Label: High Risk (RM3x3 S:2 L:3)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix3x3
rdf:value 0.67
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM3x3 S:3 L:1)

IRI https://w3id.org/dpv/risk#RM3x3S3L1
Term: RM3x3S3L1
Label: Moderate Risk (RM3x3 S:3 L:1)
Description: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix3x3
rdf:value 0.33
dpv:hasSeverityrisk:HighSeverity
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM3x3 S:3 L:2)

IRI https://w3id.org/dpv/risk#RM3x3S3L2
Term: RM3x3S3L2
Label: High Risk (RM3x3 S:3 L:2)
Description: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix3x3
rdf:value 0.67
dpv:hasSeverityrisk:HighSeverity
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM3x3 S:3 L:3)

IRI https://w3id.org/dpv/risk#RM3x3S3L3
Term: RM3x3S3L3
Label: High Risk (RM3x3 S:3 L:3)
Description: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix3x3
rdf:value 1.00
dpv:hasSeverityrisk:HighSeverity
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM5x5 S:1 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S1L1
Term: RM5x5S1L1
Label: Very Low Risk (RM5x5 S:1 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.04
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM5x5 S:1 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S1L2
Term: RM5x5S1L2
Label: Very Low Risk (RM5x5 S:1 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: Low; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.08
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM5x5 S:1 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S1L3
Term: RM5x5S1L3
Label: Very Low Risk (RM5x5 S:1 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: Moderate; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.12
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasSeverityrisk:VeryLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM5x5 S:1 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S1L4
Term: RM5x5S1L4
Label: Low Risk (RM5x5 S:1 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: High; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.16
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:LowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM5x5 S:1 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S1L5
Term: RM5x5S1L5
Label: Low Risk (RM5x5 S:1 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryHigh; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.20
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM5x5 S:2 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S2L1
Term: RM5x5S2L1
Label: Very Low Risk (RM5x5 S:2 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: VeryLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.08
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM5x5 S:2 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S2L2
Term: RM5x5S2L2
Label: Low Risk (RM5x5 S:2 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.16
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM5x5 S:2 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S2L3
Term: RM5x5S2L3
Label: Moderate Risk (RM5x5 S:2 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.24
dpv:hasSeverityrisk:LowSeverity
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM5x5 S:2 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S2L4
Term: RM5x5S2L4
Label: Moderate Risk (RM5x5 S:2 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.32
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:LowSeverity
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM5x5 S:2 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S2L5
Term: RM5x5S2L5
Label: High Risk (RM5x5 S:2 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: VeryHigh; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.40
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM5x5 S:3 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S3L1
Term: RM5x5S3L1
Label: Very Low Risk (RM5x5 S:3 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.12
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM5x5 S:3 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S3L2
Term: RM5x5S3L2
Label: Moderate Risk (RM5x5 S:3 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.24
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM5x5 S:3 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S3L3
Term: RM5x5S3L3
Label: Moderate Risk (RM5x5 S:3 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.36
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM5x5 S:3 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S3L4
Term: RM5x5S3L4
Label: High Risk (RM5x5 S:3 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.48
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM5x5 S:3 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S3L5
Term: RM5x5S3L5
Label: Very High Risk (RM5x5 S:3 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 0.60
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasRiskLevelrisk:VeryHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM5x5 S:4 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S4L1
Term: RM5x5S4L1
Label: Low Risk (RM5x5 S:4 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: VeryLow; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.16
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM5x5 S:4 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S4L2
Term: RM5x5S4L2
Label: Moderate Risk (RM5x5 S:4 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.32
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM5x5 S:4 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S4L3
Term: RM5x5S4L3
Label: High Risk (RM5x5 S:4 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.48
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:HighSeverity
dpv:hasRiskLevelrisk:HighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM5x5 S:4 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S4L4
Term: RM5x5S4L4
Label: Very High Risk (RM5x5 S:4 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 0.64
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasRiskLevelrisk:VeryHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM5x5 S:4 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S4L5
Term: RM5x5S4L5
Label: Very High Risk (RM5x5 S:4 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: VeryHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 0.80
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasSeverityrisk:HighSeverity
dpv:hasRiskLevelrisk:VeryHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM5x5 S:5 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S5L1
Term: RM5x5S5L1
Label: Low Risk (RM5x5 S:5 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryLow; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.20
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasRiskLevelrisk:LowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM5x5 S:5 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S5L2
Term: RM5x5S5L2
Label: High Risk (RM5x5 S:5 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Low; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.40
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM5x5 S:5 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S5L3
Term: RM5x5S5L3
Label: High Risk (RM5x5 S:5 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.60
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM5x5 S:5 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S5L4
Term: RM5x5S5L4
Label: Very High Risk (RM5x5 S:5 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: High; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 0.80
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM5x5 S:5 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S5L5
Term: RM5x5S5L5
Label: Very High Risk (RM5x5 S:5 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 1.00
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Risk (RM7x7 S:1 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S1L1
Term: RM7x7S1L1
Label: Extremely Low Risk (RM7x7 S:1 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.02
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Risk (RM7x7 S:1 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S1L2
Term: RM7x7S1L2
Label: Extremely Low Risk (RM7x7 S:1 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: VeryLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.04
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Risk (RM7x7 S:1 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S1L3
Term: RM7x7S1L3
Label: Extremely Low Risk (RM7x7 S:1 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: Low; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.06
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM7x7 S:1 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S1L4
Term: RM7x7S1L4
Label: Very Low Risk (RM7x7 S:1 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: Moderate; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.08
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM7x7 S:1 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S1L5
Term: RM7x7S1L5
Label: Very Low Risk (RM7x7 S:1 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: High; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.10
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM7x7 S:1 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S1L6
Term: RM7x7S1L6
Label: Very Low Risk (RM7x7 S:1 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: VeryHigh; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.12
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM7x7 S:1 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S1L7
Term: RM7x7S1L7
Label: Low Risk (RM7x7 S:1 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: ExtremelyHigh; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.14
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasRiskLevelrisk:LowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Risk (RM7x7 S:2 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S2L1
Term: RM7x7S2L1
Label: Extremely Low Risk (RM7x7 S:2 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.04
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:ExtremelyLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Risk (RM7x7 S:2 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S2L2
Term: RM7x7S2L2
Label: Extremely Low Risk (RM7x7 S:2 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.08
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM7x7 S:2 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S2L3
Term: RM7x7S2L3
Label: Very Low Risk (RM7x7 S:2 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: Low; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.12
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM7x7 S:2 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S2L4
Term: RM7x7S2L4
Label: Low Risk (RM7x7 S:2 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: Moderate; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.16
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM7x7 S:2 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S2L5
Term: RM7x7S2L5
Label: Low Risk (RM7x7 S:2 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: High; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.20
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:LowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM7x7 S:2 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S2L6
Term: RM7x7S2L6
Label: Moderate Risk (RM7x7 S:2 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryHigh; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.24
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM7x7 S:2 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S2L7
Term: RM7x7S2L7
Label: Moderate Risk (RM7x7 S:2 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: ExtremelyHigh; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.29
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Risk (RM7x7 S:3 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S3L1
Term: RM7x7S3L1
Label: Extremely Low Risk (RM7x7 S:3 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.06
dpv:hasSeverityrisk:LowSeverity
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM7x7 S:3 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S3L2
Term: RM7x7S3L2
Label: Very Low Risk (RM7x7 S:3 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: VeryLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.12
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM7x7 S:3 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S3L3
Term: RM7x7S3L3
Label: Low Risk (RM7x7 S:3 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.18
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:LowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM7x7 S:3 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S3L4
Term: RM7x7S3L4
Label: Moderate Risk (RM7x7 S:3 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.24
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:LowSeverity
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM7x7 S:3 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S3L5
Term: RM7x7S3L5
Label: High Risk (RM7x7 S:3 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.31
dpv:hasSeverityrisk:LowSeverity
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM7x7 S:3 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S3L6
Term: RM7x7S3L6
Label: High Risk (RM7x7 S:3 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: VeryHigh; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.37
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM7x7 S:3 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S3L7
Term: RM7x7S3L7
Label: Very High Risk (RM7x7 S:3 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: ExtremelyHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.43
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasSeverityrisk:LowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely Low Risk (RM7x7 S:4 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S4L1
Term: RM7x7S4L1
Label: Extremely Low Risk (RM7x7 S:4 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.08
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasRiskLevelrisk:ExtremelyLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM7x7 S:4 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S4L2
Term: RM7x7S4L2
Label: Low Risk (RM7x7 S:4 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryLow; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.16
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM7x7 S:4 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S4L3
Term: RM7x7S4L3
Label: Moderate Risk (RM7x7 S:4 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.24
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM7x7 S:4 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S4L4
Term: RM7x7S4L4
Label: High Risk (RM7x7 S:4 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.33
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM7x7 S:4 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S4L5
Term: RM7x7S4L5
Label: High Risk (RM7x7 S:4 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.41
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM7x7 S:4 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S4L6
Term: RM7x7S4L6
Label: Very High Risk (RM7x7 S:4 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.49
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:VeryHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM7x7 S:4 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S4L7
Term: RM7x7S4L7
Label: Very High Risk (RM7x7 S:4 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: ExtremelyHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.57
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM7x7 S:5 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S5L1
Term: RM7x7S5L1
Label: Very Low Risk (RM7x7 S:5 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: ExtremelyLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.10
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM7x7 S:5 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S5L2
Term: RM7x7S5L2
Label: Low Risk (RM7x7 S:5 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: VeryLow; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.20
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM7x7 S:5 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S5L3
Term: RM7x7S5L3
Label: Moderate Risk (RM7x7 S:5 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.31
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM7x7 S:5 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S5L4
Term: RM7x7S5L4
Label: High Risk (RM7x7 S:5 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.41
dpv:hasSeverityrisk:HighSeverity
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM7x7 S:5 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S5L5
Term: RM7x7S5L5
Label: Very High Risk (RM7x7 S:5 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.51
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Risk (RM7x7 S:5 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S5L6
Term: RM7x7S5L6
Label: Extremely High Risk (RM7x7 S:5 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.61
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Risk (RM7x7 S:5 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S5L7
Term: RM7x7S5L7
Label: Extremely High Risk (RM7x7 S:5 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.71
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Very Low Risk (RM7x7 S:6 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S6L1
Term: RM7x7S6L1
Label: Very Low Risk (RM7x7 S:6 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: ExtremelyLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.12
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM7x7 S:6 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S6L2
Term: RM7x7S6L2
Label: Moderate Risk (RM7x7 S:6 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryLow; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.24
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM7x7 S:6 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S6L3
Term: RM7x7S6L3
Label: High Risk (RM7x7 S:6 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Low; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.37
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasRiskLevelrisk:HighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM7x7 S:6 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S6L4
Term: RM7x7S6L4
Label: Very High Risk (RM7x7 S:6 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Moderate; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.49
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM7x7 S:6 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S6L5
Term: RM7x7S6L5
Label: Very High Risk (RM7x7 S:6 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: High; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.61
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Risk (RM7x7 S:6 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S6L6
Term: RM7x7S6L6
Label: Extremely High Risk (RM7x7 S:6 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.73
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Risk (RM7x7 S:6 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S6L7
Term: RM7x7S6L7
Label: Extremely High Risk (RM7x7 S:6 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.86
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Low Risk (RM7x7 S:7 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S7L1
Term: RM7x7S7L1
Label: Low Risk (RM7x7 S:7 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: ExtremelyLow; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.14
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasRiskLevelrisk:LowRisk
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Moderate Risk (RM7x7 S:7 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S7L2
Term: RM7x7S7L2
Label: Moderate Risk (RM7x7 S:7 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: VeryLow; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.29
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

High Risk (RM7x7 S:7 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S7L3
Term: RM7x7S7L3
Label: High Risk (RM7x7 S:7 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: Low; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.43
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:HighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Very High Risk (RM7x7 S:7 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S7L4
Term: RM7x7S7L4
Label: Very High Risk (RM7x7 S:7 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: Moderate; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.57
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasRiskLevelrisk:VeryHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Risk (RM7x7 S:7 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S7L5
Term: RM7x7S7L5
Label: Extremely High Risk (RM7x7 S:7 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: High; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.71
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:ExtremelyHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Risk (RM7x7 S:7 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S7L6
Term: RM7x7S7L6
Label: Extremely High Risk (RM7x7 S:7 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.86
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

Extremely High Risk (RM7x7 S:7 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S7L7
Term: RM7x7S7L7
Label: Extremely High Risk (RM7x7 S:7 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 1.00
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

Proposed Terms

The following terms have been proposed for inclusion, and are under discussion. They are provided here for illustrative purposes and should not be considered as part of DPV.

risk_consequences

Funding Acknowledgements

Funding Sponsors

The DPVCG and DPV were initiated as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601. The SPECIAL project ran over a 3-year period from 2017 to 2019.

Harshvardhan J. Pandit was funded by the Irish Research Council Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790 for working within the DPVCG and contributing to the DPV. The fellowship lasted from 2020 to 2022.

Funding Acknowledgements for Contributors

The contributions of Harshvardhan J. Pandit have received funding from the ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards)