|
|
| Probability of occurrence | Potential damage | Decision | Reasons |
---|
Financial | 1 | GAFAM | - (once in 10 years)
- (once in 5 years)
- (once in 2 years)
- (once in 1 years)
- (many times in a year)
| - Low
- Medium
- High
- Very high
| - Accept
- Mitigate
- Avoid
- Transfer
- Deny
|
|
2 | Competing technology | - (once in 10 years)
- (once in 5 years)
- (once in 2 years)
- (once in 1 years)
- (many times in a year)
| - Low
- Medium
- High
- Very high
| - Accept
- Mitigate
- Avoid
- Transfer
- Deny
- Accept
- Mitigate
- Avoid
- Transfer
- Deny
|
|
3 | Market Growth Challenges | - (once in 10 years)
- (once in 5 years)
- (once in 2 years)
- (once in 1 years)
- (many times in a year)
| - Low
- Medium
- High
- Very high
| - Accept
- Mitigate
- Avoid
- Transfer
- Deny
|
|
4 | Funding | - (once in 10 years)
- (once in 5 years)
- (once in 2 years)
- (once in 1 years)
- (many times in a year)
| - Low
- Medium
- High
- Very high
| - Accept
- Mitigate
- Avoid
- Transfer
- Deny
|
|
5 | Environmental cost | - (once in 10 years)
- (once in 5 years)
- (once in 2 years)
- (once in 1 years)
- (many times in a year)
| - Low
- Medium
- High
- Very high
| - Accept
- Mitigate
- Avoid
- Transfer
- Deny
|
|
Legal | 6 | Governments Rules | - (once in 10 years)
- (once in 5 years)
- (once in 2 years)
- (once in 1 years)
- (many times in a year)
| - Low
- Medium
- High
- Very high
| - Accept
- Mitigate
- Avoid
- Transfer
- Deny
|
|
7 | International Compatibility (ex. GDPR) | - (once in 10 years)
- (once in 5 years)
- (once in 2 years)
- (once in 1 years)
- (many times in a year)
| - Low
- Medium
- High
- Very high
| - Accept
- Mitigate
- Avoid
- Transfer
- Deny
|
|
| 8 | No definition or legal commitment for punishment in regard of misusing | - (once in 10 years)
- (once in 5 years)
- (once in 2 years)
- (once in 1 years)
- (many times in a year)
| - Low
- Medium
- High
- Very high
| - Accept
- Mitigate
- Avoid
- Transfer
- Deny
|
|
Strategic | 7 | Dependency |
|
|
|
|
8 | Intermediaries |
|
|
|
|
9 | Acceptance |
|
|
|
|
10 | Engagement (Governance Rules) |
|
|
|
|
11 | Usability |
|
|
|
|
12 | Interoperability (Standards and Protocols) |
|
|
|
|
13 | Integration |
|
|
|
|
14 | Communication (Marketing) |
|
|
|
|
Security | 15 | Physical vulnerabilities (Device lost) |
|
|
|
|
16 | Protecting sensitive data
|
|
|
|
|